Cryptology ePrint Archive: Listing for 2013

2013/882 ( PDF )
New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers
Zhe Liu and Johann Gro{\ss}sch{\"a}dl
2013/881 ( PDF )
Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains
Yonatan Sompolinsky and Aviv Zohar
2013/880 ( PDF )
New Constructions of Revocable Identity-Based Encryption from Multilinear Maps
Seunghwan Park and Kwangsu Lee and Dong Hoon Lee
2013/879 ( PDF )
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture
Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza
2013/878 ( PDF )
Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs
Shaohua Tang and Bo Lv and Guomin Chen and Zhiniang Peng
2013/877 ( PDF )
MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature
Shaohua Tang, Jiahui Chen, Lingling Xu, Xiaoyu Li
2013/876 ( PDF )
Public-Key Encryption with Lazy Parties
Kenji Yasunaga
2013/875 ( PDF )
Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE
Michael Clear and Ciaran McGoldrick
2013/874 ( PDF )
Constant-Round Rational Secret Sharing with Optimal Coalition Resilience
Akinori Kawachi and Yoshio Okamoto and Keisuke Tanaka and Kenji Yasunaga
2013/873 ( PDF )
Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation
Mihir Bellare and Igors Stepanovs and Stefano Tessaro
2013/872 ( -- withdrawn -- )
2013/871 ( PDF )
A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities
Weiqiang Wen and Libin Wang and Jiaxin Pan
2013/870 ( PDF )
A new class of hyper-bent functions and Kloosterman sums
Chunming Tang, Yanfeng Qi
2013/869 ( PDF )
How to Fake Auxiliary Input
Dimitar Jetchev and Krzysztof Pietrzak
2013/868 ( PDF )
Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)
Lear Bahack
2013/867 ( PDF )
LHash: A Lightweight Hash Function (Full Version)
Wenling Wu and Shuang Wu and Lei Zhang and Jian Zou and Le Dong
2013/866 ( PDF )
Compact Ring-LWE based Cryptoprocessor
Sujoy Sinha Roy and Frederik Vercauteren and Nele Mentens and Donald Donglong Chen and Ingrid Verbauwhede
2013/865 ( PDF )
SNR to Success Rate: Reaching the Limit of Non-Profiling DPA
Suvadeep Hajra and Debdeep Mukhopadhyay
2013/864 ( PDF )
Near-linear time, Leakage-resilient Key Evolution Schemes from Expander Graphs
Adam Smith and Ye Zhang
2013/863 ( PDF )
Formal Treatment of Distributed Trust in Electronic Voting
Stephan Neumann and Melanie Volkamer
2013/862 ( PDF )
How to Delegate Computations: The Power of No-Signaling Proofs
Yael Tauman Kalai and Ran Raz and Ron Rothblum
2013/861 ( PDF )
Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments
Muhammad Rizwan Asghar
2013/860 ( PDF )
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
Sanjam Garg and Craig Gentry and Shai Halevi and Daniel Wichs
2013/859 ( PDF )
Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis
Yanis Linge and Cecile Dumas and Sophie Lambert-Lacroix
2013/858 ( PDF )
Practical Dual-Receiver Encryption---Soundness, Complete Non-Malleability, and Applications
Sherman S.M. Chow and Matthew Franklin and Haibin Zhang
2013/857 ( PDF )
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
Daniel Genkin and Adi Shamir and Eran Tromer
2013/856 ( PDF )
Tightly-Secure Signatures From Lossy Identification Schemes
Michel Abdalla and Pierre-Alain Fouque and Vadim Lyubashevsky and Mehdi Tibouchi
2013/855 ( PDF )
Weaknesses in a Recently Proposed RFID Authentication Protocol
Mete Akg\"{u}n, M. Ufuk \c{C}a\v{g}layan
2013/854 ( PDF )
Multiple-Use Transferable E-Cash
Pratik Sarkar
2013/853 ( PDF )
Automatic Search for Differential Trails in ARX Ciphers (Extended Version)
Alex Biryukov and Vesselin Velichkov
2013/852 ( PDF )
Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256
Dongxia Bai and Hongbo Yu and Gaoli Wang and Xiaoyun Wang
2013/851 ( PDF )
Power and Timing Side Channels for PUFs and their Efficient Exploitation
Ulrich Rührmair and Xiaolin Xu and Jan Sölter and Ahmed Mahmoud and Farinaz Koushanfar and Wayne Burleson
2013/850 ( PDF )
Secure Floating-Point Arithmetic and Private Satellite Collision Analysis
Liina Kamm and Jan Willemson
2013/849 ( PDF )
Pushing the Limit of Non-Profiling DPA using Multivariate Leakage Model
Suvadeep Hajra and Debdeep Mukhopadhyay
2013/848 ( PDF )
Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols
Xi-Jun Lin and Lin Sun
2013/847 ( -- withdrawn -- )
Ultralightweight cryptography for passive RFID system
Umar Mujahid, M.Najam-ul-islam, Jameel Ahmed
2013/846 ( -- withdrawn -- )
A new attack on RSA with a composed decryption exponent
Abderrahmane Nitaj and Mohamed Ould Douh
2013/845 ( PDF )
How to Keep a Secret: Leakage Deterring Public-key Cryptography
Aggelos Kiayias and Qiang Tang
2013/844 ( PDF )
A generic view on trace-and-revoke broadcast encryption schemes
Dennis Hofheinz and Christoph Striecks
2013/843 ( PDF )
A Study of Goldbach's conjecture and Polignac's conjecture equivalence issues
Jian Ye and Chenglian Liu
2013/842 ( PDF )
Detecting Hidden Leakages
Amir Moradi and Sylvain Guilley and Annelie Heuser
2013/841 ( PDF )
Trust Views for the Web PKI
Johannes Braun, Florian Volk, Johannes Buchmann and Max Mühlhäuser
2013/840 ( PDF )
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens
Seung Geol Choi and Jonathan Katz and Dominique Schröder and Arkady Yerukhimovich and Hong Sheng Zhou
2013/839 ( PDF )
Lattice Decoding Attacks on Binary LWE
Shi Bai and Steven D. Galbraith
2013/838 ( PDF )
An improved compression technique for signatures based on learning with errors
Shi Bai and Steven D. Galbraith
2013/837 ( PDF )
Fair Two-Party Computations via Bitcoin Deposits
Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Łukasz Mazurek
2013/836 ( PDF )
Identity-Based Key-Encapsulation Mechanism from Multilinear Maps
Hao Wang and Lei Wu and Zhihua Zheng and Yilei Wang
2013/835 ( PDF )
A Modular Framework for Building Variable-Input Length Tweakable Ciphers
Thomas Shrimpton and R. Seth Terashima
2013/834 ( PDF )
Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees
Ahto Buldas and Andres Kroonmaa and Risto Laanoja
2013/833 ( PDF )
Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions
Fabrice Benhamouda and David Pointcheval
2013/832 ( PDF )
Practical Dynamic Searchable Encryption with Small Leakage
Emil Stefanov and Charalampos Papamanthou and Elaine Shi
2013/831 ( PDF )
Provable Security Proofs and their Interpretation in the Real World
Vikram Singh
2013/830 ( PDF )
Property Preserving Symmetric Encryption Revisited
Sanjit Chatterjee and M. Prem Laxman Das
2013/829 ( PDF )
Is Bitcoin a Decentralized Currency?
Arthur Gervais and Ghassan Karame and Srdjan Capkun and Vedran Capkun
2013/828 ( PDF )
Decentralized Traceable Attribute-Based Signatures
Ali El Kaafarani and Essam Ghadafi and Dalia Khader
2013/827 ( PDF )
Lower Bounds in the Hardware Token Model
Shashank Agrawal and Prabhanjan Ananth and Vipul Goyal and Manoj Prabhakaran and Alon Rosen
2013/826 ( PDF )
Secure multi-party data analysis: end user validation and practical experiments
Dan Bogdanov and Liina Kamm and Sven Laur and Pille Pruulmann-Vengerfeldt
2013/825 ( -- withdrawn -- )
EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen
Alberto Peinado and Jorge Munilla and Amparo Fúster
2013/824 ( PDF )
Fair and Efficient Secure Multiparty Computation with Reputation Systems
Gilad Asharov and Yehuda Lindell and Hila Zarosim
2013/823 ( PDF )
Another Look at XCB
Debrup Chakraborty and Vicente Hernandez-Jimenez and Palash Sarkar
2013/822 ( PDF )
Leakage Resilient Fully Homomorphic Encryption
Alexandra Berkoff and Feng-Hao Liu
2013/821 ( -- withdrawn -- )
Exact Smooth Projective Hash Function based on LWE
Olivier Blazy and Céline Chevalier and Léo Ducas and Jiaxin Pan
2013/820 ( -- withdrawn -- )
On the Security of Recently Proposed RFID Protocols
Mete Akg\"{u}n, M. Ufuk \c{C}a\v{g}layan
2013/819 ( PDF )
Safe enclosures: towards cryptographic techniques for server protection
Sergiu Bursuc and Julian P. Murphy
2013/818 ( PDF )
On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography
Roberto De Prisco and Alfredo De Santis
2013/817 ( PDF )
Interactive Encryption and Message Authentication
Yevgeniy Dodis and Dario Fiore
2013/816 ( PDF )
Fast Prime Field Elliptic Curve Cryptography with 256 Bit Primes
Shay Gueron and Vlad Krasnov
2013/815 ( PDF )
Iterated group products and leakage resilience against NC^1
Eric Miles
2013/814 ( PDF )
RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases
Lil Maria Rodriguez-Henriquez and Debrup Chakraborty
2013/813 ( PDF )
Multi-ciphersuite security of the Secure Shell (SSH) protocol
Florian Bergsma and Benjamin Dowling and Florian Kohlar and Jörg Schwenk and Douglas Stebila
2013/812 ( PDF )
A Note on Bilinear Groups of a Large Composite Order
Zhengjun Cao and Lihua Liu
2013/811 ( PDF )
Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol
Susumu Kiyoshima and Yoshifumi Manabe and Tatsuaki Okamoto
2013/810 ( PDF )
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack
Pablo Rauzy and Sylvain Guilley
2013/809 ( PDF )
Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing
Sarah Ibrahimi and Boris Skoric and Jan-Jaap Oosterwijk
2013/808 ( PDF )
Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources
Michael Backes and Aniket Kate and Sebastian Meiser and Tim Ruffing
2013/807 ( PDF )
Distributed Key Generation for Secure Encrypted Deduplication
Yitao Duan
2013/806 ( PDF )
Efficient (Anonymous) Compact HIBE From Standard Assumptions
Somindu C. Ramanna and Palash Sarkar
2013/805 ( PDF )
Proofs of Space: When Space is of the Essence
Giuseppe Ateniese and Ilario Bonacina and Antonio Faonio and Nicola Galesi
2013/804 ( PDF )
Group Signature with relaxed-privacy and revocability for VANET
Mohammad Saiful Islam Mamun and Atsuko Miyaji
2013/803 ( PDF )
Fully, (Almost) Tightly Secure IBE from Standard Assumptions
Jie Chen and Hoeteck Wee
2013/802 ( PDF )
Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Functions
Guangjun Fan and Yongbin Zhou and Chengyu Hu and Dengguo Feng
2013/801 ( PDF )
Authenticating Computation on Groups: New Homomorphic Primitives and Applications
Dario Catalano and Antonio Marcedone and Orazio Puglisi
2013/800 ( PDF )
Algebraic Properties of the Cube Attack
Frank-M. Quedenfeld and Christopher Wolf
2013/799 ( PDF )
New Insight into the Isomorphism of Polynomials problem IP1S and its Use in Cryptography
Gilles Macario-Rat and Jérôme Plût and Henri Gilbert
2013/798 ( -- withdrawn -- )
A Generic Chosen-Ciphertext Key-Leakage Secure Public Key Encryption Scheme from Hash Proof System
Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, and Zuoxia Yu
2013/797 ( PDF )
Tamper Resilient Circuits: The Adversary at the Gates
Aggelos Kiayias and Yiannis Tselekounis
2013/796 ( PDF )
Proofs of Space
Stefan Dziembowski and Sebastian Faust and Vladimir Kolmogorov and Krzysztof Pietrzak
2013/795 ( PDF )
Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications
Xi-Jun Lin and Lin Sun
2013/794 ( PDF )
Behind the Scene of Side Channel Attacks
Victor Lomn\'{e}, Emmanuel Prouff, and Thomas Roche
2013/793 ( PDF )
A fast integer-based batch full-homomorphic encryption scheme over finite field
Long Zhang and Qiuling Yue
2013/792 ( PDF )
Improved Authenticity Bound of EAX, and Refinements
Kazuhiko Minematsu and Stefan Lucks and Tetsu Iwata
2013/791 ( PDF )
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
Elena Andreeva and Beg\"ul Bilgin and Andrey Bogdanov and Atul Luykx and Bart Mennink and Nicky Mouha and Kan Yasuda
2013/790 ( PDF )
Parallelizable and Authenticated Online Ciphers
Elena Andreeva and Andrey Bogdanov and Atul Luykx and Bart Mennink and Elmar Tischhauser and Kan Yasuda
2013/789 ( PDF )
Proofs of Data Possession and Retrievability Based on MRD Codes
Shuai Han and Shengli Liu and Kefei Chen and Dawu Gu
2013/788 ( PDF )
Improvement of Lin-Tzeng Solution to Yao's Millionaires Problem and Its Cheating Advantage Analysis
Zhengjun Cao and Lihua Liu
2013/787 ( PDF )
Wide-weak Privacy Preserving RFID Mutual Authentication Protocol
Raghuvir Songhela and Manik Lal Das
2013/786 ( PDF )
Tree Based Symmetric Key Broadcast Encryption
Sanjay Bhattacherjee and Palash Sarkar
2013/785 ( PDF )
Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model
Fei Tang, Hongda Li, Qihua Niu, and Bei Liang
2013/784 ( PDF )
Secure Multiparty Computations on Bitcoin
Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Łukasz Mazurek
2013/783 ( PDF )
ECC-Based Non-Interactive Deniable Authentication with Designated Verifier
Yalin Chen and Jue-Sam Chou2
2013/782 ( PDF )
How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?
Dorit Ron and Adi Shamir
2013/781 ( PDF )
Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings
Rafael Pass and Karn Seth and Sidharth Telang
2013/780 ( PDF )
A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester
Nasser Ramazani Darmian
2013/779 ( PDF )
Distributed Group Authentication for RFID Supply Management
Mike Burmester and Jorge Munilla
2013/778 ( PDF )
Multi-Stage Fault Attacks on Block Ciphers
Philipp Jovanovic and Martin Kreuzer and Ilia Polian
2013/777 ( PDF )
Construction of Multiplicative Monotone Span Program
Yuenai Chen and Chunming Tang
2013/776 ( PDF )
Location Leakage in Distance Bounding: Why Location Privacy does not Work
Aikaterini Mitrokotsa and Cristina Onete and Serge Vaudenay
2013/775 ( PDF )
Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro
Yanfeng Wang, Wenling Wu, Zhiyuan Guo and Xiaoli Yu
2013/774 ( PDF )
Multi-Input Functional Encryption
S. Dov Gordon and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou
2013/773 ( PDF )
CBEAM: Efficient Authenticated Encryption from Feebly One-Way $\phi$ Functions
Markku-Juhani O. Saarinen
2013/772 ( PDF )
Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation
Markku-Juhani O. Saarinen
2013/771 ( PDF )
TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor
Wuqiang Shen and Shaohua Tang
2013/770 ( PDF )
Efficient Template Attacks
Omar Choudary and Markus G. Kuhn
2013/769 ( PDF )
Broadcast Amplification
Martin Hirt and Ueli Maurer and Pavel Raykov
2013/768 ( PDF )
VMPC-R Cryptographically Secure Pseudo-Random Number Generator Alternative to RC4
Bartosz Zoltak
2013/767 ( PDF )
Misuse Resistant Parallel Authenticated Encryptions
Nilanjan Datta and Mridul Nandi
2013/766 ( PDF )
RankSign : an efficient signature algorithm based on the rank metric
P. Gaborit and O. Ruatta and J. Schrek and G. Zémor
2013/765 ( PDF )
Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited and More
Kaoru Kurosawa and Le Trieu Phong
2013/764 ( PDF )
Dynamic Countermeasure Against the Zero Power Analysis
Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache
2013/763 ( PDF )
Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting
Yutaka Kawai and Katsuyuki Takashima
2013/762 ( PDF )
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
Kwangsu Lee and Seung Geol Choi and Dong Hoon Lee and Jong Hwan Park and Moti Yung
2013/761 ( PDF )
Multi-user collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE
Pierre-Alain Fouque and Antoine Joux and Chrysanthi Mavromati
2013/760 ( PDF )
On cross joining de Bruijn sequences
Johannes Mykkeltveit and Janusz Szmidt
2013/759 ( PDF )
Vectorization of ChaCha Stream Cipher
Martin Goll and Shay Gueron
2013/758 ( PDF )
A Revocable Online-Offline Certificateless Signature Scheme without Pairing
Karthik Abinav and Saikrishna Badrinarayanan and C. Pandu Rangan and S. Sharmila Deva Selvi and S. Sree Vivek and Vivek Krishna Pradhan
2013/757 ( PDF )
Practical Signatures from the Partial Fourier Recovery Problem
Jeff Hoffstein and Jill Pipher and John Schanck and Joseph H. Silverman and William Whyte
2013/756 ( PDF )
A Meet-in-the-middle Attack on Round-Reduced mCrypton
Yonglin Hao, Dongxia Bai
2013/755 ( -- withdrawn -- )
Improving security and efficiency for multi-authority access control system in cloud storage
Qi Li and Jianfeng Ma and Rui Li and Ximeng Liu and Jinbo Xiong
2013/754 ( PDF )
Obfuscation-based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP
Omkant Pandey and Manoj Prabhakaran and Amit Sahai
2013/753 ( PDF )
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures
Lejla Batina and Amitabh Das and Baris Ege and Elif Bilge Kavun and Nele Mentens and Christof Paar and Ingrid Verbauwhede and Tolga Yalcin
2013/752 ( PDF )
On the Power of Rewinding Simulators in Functional Encryption
Angelo De Caro and Vincenzo Iovino
2013/751 ( PDF )
Using Hamiltonian Totems as Passwords
Herv\'e Chabanne and Jean-Michel Cioranesco and Vincent Despiegel and Jean-Christophe Fondeur and David Naccache
2013/750 ( PDF )
Fully Deniable Mutual Authentication Protocol Based on RSA Signature
Xi-Jun Lin and Lin Sun
2013/749 ( PDF )
Efficient CCA-secure Threshold Public-Key Encryption Scheme
Xi-Jun Lin and Lin Sun
2013/748 ( PDF )
Plaintext Recovery Attacks Against WPA/TKIP
Kenneth G. Paterson and Bertram Poettering and Jacob C.N. Schuldt
2013/747 ( PDF )
Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks
Jayaprakash Kar
2013/746 ( PDF )
Asymptotically Efficient Lattice-Based Digital Signatures
Vadim Lyubashevsky and Daniele Micciancio
2013/745 ( PDF )
Asynchronous MPC with a Strict Honest Majority Using Non-equivocation
Michael Backes and Fabian Bendun and Ashish Choudhury and Aniket Kate
2013/744 ( PDF )
Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results
Shashank Agrawal and Shweta Agrawal and Saikrishna Badrinarayanan and Abishek Kumarasubramanian and Manoj Prabhakaran and Amit Sahai
2013/743 ( -- withdrawn -- )
Privacy Preserving Unique Statistics in a Smart Grid
Iraklis Leontiadis, Melek Önen, Refik Molva
2013/742 ( PDF )
CODING - Stream Cipher Methods by Varying Components during Ciphering Data
Jürgen Müller
2013/741 ( PDF )
Fast Software Implementation of Binary Elliptic Curve Cryptography
Manuel Bluhm and Shay Gueron
2013/740 ( PDF )
An efficient FHE proposal based on the hardness of solving systems of nonlinear multivariate equations (II)
Gérald Gavin
2013/739 ( PDF )
Dr. G.S.G.N.Anjaneyulu and A.Vijayabarathi
2013/738 ( PDF )
On the Resilience and Uniqueness of CPA for Secure Broadcast
Chris Litsas and Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas
2013/737 ( PDF )
Weakness of F_{3^{6*1429}} and F_{2^{4*3041}} for Discrete Logarithm Cryptography
Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodriguez-Henriquez
2013/736 ( PDF )
TRS-80 With A Keccak Sponge Cake
Jean-Marie Chauvet
2013/735 ( PDF )
Masking Tables---An Underestimated Security Risk
Michael Tunstall and Carolyn Whitnall and Elisabeth Oswald
2013/734 ( PDF )
Elliptic Curve Cryptography in Practice
Joppe W. Bos and J. Alex Halderman and Nadia Heninger and Jonathan Moore and Michael Naehrig and Eric Wustrow
2013/733 ( -- withdrawn -- )
A Key Compromise Impersonation attack against Wang's Provably Secure Identity-based Key Agreement Protocol
Maurizio Adriano Strangio
2013/732 ( PDF )
SSS-V2: Secure Similarity Search
Hyun-A Park
2013/731 ( PDF )
Constructing Differentially 4-uniform Permutations over GF(2^{2k}) from the Inverse Function Revisited
Yongqiang Li and Mingsheng Wang and Yuyin Yu
2013/730 ( PDF )
Stamp \& Extend -- Instant but Undeniable Timestamping based on Lazy Trees
{\L}ukasz Krzywiecki and Przemys{\l}aw Kubiak and Miros{\l}aw Kuty{\l}owski
2013/729 ( PDF )
Functional Encryption for Randomized Functionalities
Vipul Goyal and Abhishek Jain and Venkata Koppula and Amit Sahai
2013/728 ( PDF )
Modified Alternating Step Generators
Robert Wicik and Tomasz Rachwalik
2013/727 ( PDF )
Multi-Input Functional Encryption
Shafi Goldwasser and Vipul Goyal and Abhishek Jain and Amit Sahai
2013/726 ( PDF )
Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack
Chihong Joo and Aaram Yun
2013/725 ( -- withdrawn -- )
Mobile Transaction over NFC and GSM
Muhammad Qasim Saeed and Pardis Pourghomi
2013/724 ( PDF )
Verifiable Set Operations over Outsourced Databases
Ran Canetti and Omer Paneth and Dimitrios Papadopoulos and Nikos Triandopoulos
2013/723 ( PDF )
Amplifying Privacy in Privacy Amplification
Divesh Aggarwal and Yevgeniy Dodis and Zahra Jafargholi and Eric Miles and Leonid Reyzin
2013/722 ( PDF )
The Realm of the Pairings
Diego F. Aranha and Paulo S. L. M. Barreto and Patrick Longa and Jefferson E. Ricardini
2013/721 ( PDF )
Deep Attacks of a Certificateless Signature Scheme
Bo Yang and Zhao Yang and Zibi Xiao and Shougui Li
2013/720 ( PDF )
Outsourced Symmetric Private Information Retrieval
Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel Rosu and Michael Steiner
2013/719 ( PDF )
Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited
Sandro Coretti and Ueli Maurer and Björn Tackmann
2013/718 ( PDF )
NTRU-KE: A Lattice-based Public Key Exchange Protocol
Xinyu Lei and Xiaofeng Liao
2013/717 ( PDF )
NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage
Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm
2013/716 ( PDF )
A Secure Obfuscator for Encrypted Blind Signature Functionality
Xiao Feng and Zheng Yuan
2013/715 ( PDF )
Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists
Erik-Oliver Blass and Travis Mayberry and Guevara Noubir
2013/714 ( PDF )
Method to secure data in the cloud while preserving summary statistics
Sanchita Barman, Bimal Roy
2013/713 ( PDF )
Cryptanalysis of Zorro
Jian Guo and Ivica Nikolic and Thomas Peyrin and Lei Wang
2013/712 ( PDF )
PUF-Based RFID Authentication Secure and Private under Memory Leakage
Daisuke Moriyama and Shin'ichiro Matsuo and Moti Yung
2013/711 ( PDF )
Ambiguous One-Move Nominative Signature Without Random Oracles
Dennis Y. W. Liu and Duncan S. Wong and Qiong Huang
2013/710 ( PDF )
An Approach to Reduce Storage for Homomorphic Computations
Jung Hee Cheon and Jinsu Kim
2013/709 ( PDF )
Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active \& Concurrent Attacks
Mohammad Sadeq Dousti and Rasool Jalili
2013/708 ( PDF )
Key Derivation Without Entropy Waste
Yevgeniy Dodis and Krzysztof Pietrzak and Daniel Wichs
2013/707 ( PDF )
A reduction of semigroup DLP to classic DLP
Matan Banin and Boaz Tsaban
2013/706 ( PDF )
How to Certify the Leakage of a Chip?
François Durvaux and François-Xavier Standaert and Nicolas Veyrat-Charvillon
2013/705 ( PDF )
Symmetric Digit Sets for Elliptic Curve Scalar Multiplication without Precomputation
Clemens Heuberger and Michela Mazzoli
2013/704 ( PDF )
Adaptive Witness Encryption and Asymmetric Password-based Cryptography
Mihir Bellare and Viet Tung Hoang
2013/703 ( PDF )
Limits of Extractability Assumptions with Distributional Auxiliary Input
Elette Boyle and Rafael Pass
2013/702 ( PDF )
Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits
Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs
2013/701 ( PDF )
More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input
Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen
2013/700 ( PDF )
Higher Order Masking of Look-up Tables
Jean-Sebastien Coron
2013/699 ( PDF )
Bootstrapping Obfuscators via Fast Pseudorandom Functions
Benny Applebaum
2013/698 ( PDF )
Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks
Xi-Jun Lin and Lin Sun
2013/697 ( PDF )
A More Efficient AES Threshold Implementation
Begul Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen
2013/696 ( PDF )
Examination of a New Defense Mechanism: Honeywords
Ziya Alper Genc, Suleyman Kardas, Mehmet Sabir Kiraz
2013/695 ( PDF )
AEGIS: A Fast Authenticated Encryption Algorithm
Hongjun Wu and Bart Preneel
2013/694 ( PDF )
Write-Only Oblivious RAM based Privacy-Preserved Access of Outsourced Data
Lichun Li and Anwitaman Datta
2013/693 ( PDF )
Secure Key Exchange and Sessions Without Credentials
Ran Canetti and Vladimir Kolesnikov and Charles Rackoff and and Yevgeniy Vahlis
2013/692 ( PDF )
Faster Compact Diffie-Hellman: Endomorphisms on the x-line
Craig Costello and Huseyin Hisil and Benjamin Smith
2013/691 ( PDF )
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures
Benoit Libert and Thomas Peters and Marc Joye and Moti Yung
2013/690 ( PDF )
Obfuscation ==> (IND-CPA Security =/=> Circular Security)
Antonio Marcedone and Claudio Orlandi
2013/689 ( PDF )
Differing-Inputs Obfuscation and Applications
Prabhanjan Ananth and Dan Boneh and Sanjam Garg and Amit Sahai and Mark Zhandry
2013/688 ( PDF )
Unbalancing Pairing-Based Key Exchange Protocols
Michael Scott
2013/687 ( PDF )
How to Compress (Reusable) Garbled Circuits
Craig Gentry and Sergey Gorbunov and Shai Halevi and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy
2013/686 ( PDF )
New abstractions in applied pi-calculus and automated verification of protected executions
Shiwei Xu and Sergiu Bursuc and Julian P. Murphy
2013/685 ( PDF )
Solving shortest and closest vector problems: The decomposition approach
Anja Becker, Nicolas Gama and Antoine Joux
2013/684 ( PDF )
Fully Bideniable Public-Key Encryption
Marcel Šebek
2013/683 ( PDF )
Separations in Circular Security for Arbitrary Length Key Cycles
Venkata Koppula and Kim Ramchen and Brent Waters
2013/682 ( PDF )
Secret Key Cryptosystem based on Non-Systematic Polar Codes
Reza Hooshmand, Mohammad Reza Aref, and Taraneh Eghlidos
2013/681 ( PDF )
Public-Key Encryption with Weak Randomness: Security against Strong Chosen Distribution Attacks
Damien Vergnaud and David Xiao
2013/680 ( PDF )
A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware Encryption Scheme
Dana Dachman-Soled
2013/679 ( PDF )
Formal verification of a software countermeasure against instruction skip attacks
Nicolas Moro and Karine Heydemann and Emmanuelle Encrenaz and Bruno Robisson
2013/678 ( PDF )
Universally composable privacy preserving finite automata execution with low online and offline complexity
Peeter Laud and Jan Willemson
2013/677 ( PDF )
Bounded Tamper Resilience: How to go beyond the Algebraic Barrier
Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi
2013/676 ( PDF )
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers
Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song
2013/675 ( PDF )
A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher
Tomer Ashur and Orr Dunkelman
2013/674 ( PDF )
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
2013/673 ( PDF )
Traps to the BGJT-Algorithm for Discrete Logarithms
Qi Cheng and Daqing Wan and Jincheng Zhuang
2013/672 ( PDF )
Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians
Benjamin Smith
2013/671 ( PDF )
Robust Pseudorandom Generators
Yuval Ishai and Eyal Kushilevitz and Xin Li and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai and David Zuckerman
2013/670 ( PDF )
Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces
Charanjit Jutla and Arnab Roy
2013/669 ( PDF )
Attribute-Based Encryption for Arithmetic Circuits
Dan Boneh and Valeria Nikolaenko and Gil Segev
2013/668 ( PDF )
Obfuscation for Evasive Functions
Boaz Barak and Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth and Amit Sahai
2013/667 ( PDF )
A TPM Diffie-Hellman Oracle
Tolga Acar and Lan Nguyen and Greg Zaverucha
2013/666 ( PDF )
An Offline Dictionary Attack against a Three-Party Key Exchange Protocol
Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won
2013/665 ( PDF )
The Impossibility of Obfuscation with a Universal Simulator
Henry Cohn and Shafi Goldwasser and Yael Tauman Kalai
2013/664 ( PDF )
TUC: Time-sensitive and Modular Analysis of Anonymous Communication
Michael Backes and Praveen Manoharan and Esfandiar Mohammadi
2013/663 ( PDF )
Linear Cryptanalysis of Round Reduced SIMON
Javad Alizadeh, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, and Somitra Kumar Sanadhya
2013/662 ( PDF )
Fine-Tuning Groth-Sahai Proofs
Alex Escala and Jens Groth
2013/661 ( PDF )
Private aggregation on untrusted servers with customizable thresholds
Constantinos Patsakis, Michael Clear, Paul Laird
2013/660 ( PDF )
Discrete Logarithms and Mordell-Weil Groups
Mohammad Sadek
2013/659 ( PDF )
A provable secure anonymous proxy signature scheme without random oracles
Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
2013/658 ( PDF )
Parallel authenticated encryption with the duplex construction
Pawel Morawiecki and Josef Pieprzyk
2013/657 ( PDF )
New Trapdoor Projection Maps for Composite-Order Bilinear Groups
Sarah Meiklejohn and Hovav Shacham
2013/656 ( PDF )
Bias-based modeling and entropy analysis of PUFs
Robbert van den Berg and Boris Skoric and Vincent van der Leest
2013/655 ( PDF )
Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version)
Georg Neugebauer and Lucas Brutschy and Ulrike Meyer and Susanne Wetzel
2013/654 ( PDF )
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
Baodong Qin and Shengli Liu
2013/653 ( PDF )
RKA-KDM secure encryption from public-key encryption
Florian Böhl and Gareth T. Davies and Dennis Hofheinz
2013/652 ( PDF )
Efficient Modular Arithmetic for SIMD Devices
Wilke Trei
2013/651 ( PDF )
A Closer Look at Multiple Forking: Leveraging (In)dependence for a Tighter Bound
Sanjit Chatterjee and Chethan Kamath
2013/650 ( PDF )
On Extractability (a.k.a. Differing-Inputs) Obfuscation
Elette Boyle and Kai-Min Chung and Rafael Pass
2013/649 ( PDF )
Security Analysis of Password-Authenticated Key Retrieval
SeongHan Shin and Kazukuni Kobara
2013/648 ( PDF )
Integral Distinguishers for Reduced-round Stribog
Riham AlTawy and Amr M. Youssef
2013/647 ( PDF )
A note on high-security general-purpose elliptic curves
Diego F. Aranha and Paulo S. L. M. Barreto and Geovandro C. C. F. Pereira and Jefferson E. Ricardini
2013/646 ( PDF )
Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles
Johannes Blömer and Gennadij Liske
2013/645 ( PDF )
FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession
Ertem Esiner and Adilet Kachkeev and Samuel Braunfeld and Alptekin K\"up\c{c}\"u and \"Oznur \"Ozkasap
2013/644 ( PDF )
Elliptic and Hyperelliptic Curves: a Practical Security Analysis
Joppe W. Bos and Craig Costello and Andrea Miele
2013/643 ( PDF )
There is no Indistinguishability Obfuscation in Pessiland
Tal Moran and Alon Rosen
2013/642 ( PDF )
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
Dan Boneh and Mark Zhandry
2013/641 ( PDF )
Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall
Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen
2013/640 ( PDF )
Communication-Efficient MPC for General Adversary Structures
Joshua Lampkins and Rafail Ostrovsky
2013/639 ( PDF )
Differentially 4-Uniform Bijections by Permuting the Inverse Function
Deng Tang and Claude Carlet and Xiaohu Tang
2013/638 ( PDF )
DFA-Based Functional Encryption: Adaptive Security from Dual System Encryption
Somindu C. Ramanna
2013/637 ( PDF )
Detection of Algebraic Manipulation in the Presence of Leakage
Hadi Ahmadi and Reihaneh Safavi-Naini
2013/636 ( PDF )
SCARE of Secret Ciphers with SPN Structures
Matthieu Rivain and Thomas Roche
2013/635 ( PDF )
Universal security; from bits and mips to pools, lakes -- and beyond
Arjen K. Lenstra, Thorsten Kleinjung, Emmanuel Thomé
2013/634 ( PDF )
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64
Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
2013/633 ( PDF )
Four Measures of Nonlinearity
J. Boyar and M.G. Find and R. Peralta
2013/632 ( PDF )
Combined Modeling and Side Channel Attacks on Strong PUFs
Ahmed Mahmoud and Ulrich Rührmair and Mehrdad Majzoobi and Farinaz Koushanfar
2013/631 ( PDF )
Protecting Obfuscation Against Algebraic Attacks
Boaz Barak and Sanjam Garg and Yael Tauman Kalai and Omer Paneth and Amit Sahai
2013/630 ( PDF )
Estimating Key Sizes For High Dimensional Lattice-Based Systems
Joop van de Pol and Nigel P. Smart
2013/629 ( PDF )
Secure Key Management in the Cloud
Ivan Damgård and Thomas P. Jakobsen and Jesper Buus Nielsen and Jakob I. Pagter
2013/628 ( PDF )
Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
Kazuhiko Minematsu
2013/627 ( PDF )
Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud
Jiawei Yuan and Shucheng Yu
2013/626 ( PDF )
Improved Linear Attacks on the Chinese Block Cipher Standard
Mingjie Liu and Jiazhe Chen
2013/625 ( PDF )
PillarBox: Combating next-generation malware with fast forward-secure logging
Kevin D. Bowers and Catherine Hart and Ari Juels and Nikos Triandopoulos
2013/624 ( -- withdrawn -- )
New Integer-FFT Multiplication Architectures and Implementations for Accelerating Fully Homomorphic Encryption
Xiaolin Cao and Ciara Moore
2013/623 ( PDF )
Off-Path Hacking: The Illusion of Challenge-Response Authentication
Yossi Gilad and Amir Herzberg and Haya Shulman
2013/622 ( PDF )
Decentralized Anonymous Credentials
Christina Garman and Matthew Green and Ian Miers
2013/621 ( PDF )
Multi-LHL protocol
Marika Mitrengová
2013/620 ( PDF )
Do I know you? -- Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications
Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi
2013/619 ( PDF )
Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes
Jeroen Delvaux and Ingrid Verbauwhede
2013/618 ( PDF )
Security Amplification against Meet-in-the-Middle Attacks Using Whitening
Pierre-Alain Fouque and Pierre Karpman
2013/617 ( PDF )
Some results concerning global avalanche characteristics of two $q$-ary functions
Brajesh Kumar Singh
2013/616 ( PDF )
Accelerating Fully Homomorphic Encryption over the Integers with Super-size Hardware Multiplier and Modular Reduction
Xiaolin Cao, Ciara Moore, Maire O’Neill, Elizabeth O’Sullivan and Neil Hanley
2013/615 ( PDF )
Privacy and Verifiability in Voting Systems: Methods, Developments and Trends
Hugo Jonker and Sjouke Mauw and Jun Pang
2013/614 ( PDF )
Is extracting data the same as possessing data?
Douglas R. Stinson and Jalaj Upadhyay
2013/613 ( PDF )
Recomputing with Permuted Operands: A Concurrent Error Detection Approach
Xiaofei Guo and Ramesh Karri
2013/612 ( PDF )
Sub-linear Blind Ring Signatures without Random Oracles
Essam Ghadafi
2013/611 ( PDF )
Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful
Mitsugu Iwamoto and Thomas Peyrin and Yu Sasaki
2013/610 ( PDF )
Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation
Jeroen Delvaux and Ingrid Verbauwhede
2013/609 ( PDF )
Ultra Low-Power implementation of ECC on the ARM Cortex-M0+
Ruan de Clercq and Leif Uhsadel and Anthony Van Herrewege and Ingrid Verbauwhede
2013/608 ( PDF )
Towards Optimal Leakage Exploitation Rate in Template Attacks
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
2013/607 ( PDF )
Cryptanalysis of Full RIPEMD-128
Franck Landelle and Thomas Peyrin
2013/606 ( PDF )
Revocable quantum timed-release encryption
Dominique Unruh
2013/605 ( PDF )
Presentation of a new class of public key cryptosystems K(XIII)SE(1)PKC along with Kp(XIII)SE(1)PKC that realizes the coding rate of exactly 1.0, constructed by modifying K(XII)SE(1)PKC.
2013/604 ( PDF )
Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos
Jörg Schwenk
2013/603 ( PDF )
Invariance-Based Concurrent Error Detection for Advanced Encryption Standard
Xiaofei Guo and Ramesh Karri
2013/602 ( PDF )
On the Efficacy of Solving LWE by Reduction to Unique-SVP
Martin R. Albrecht and Robert Fitzpatrick and Florian G ̈opfert
2013/601 ( PDF )
Two-round secure MPC from Indistinguishability Obfuscation
Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova
2013/600 ( PDF )
Improved Cryptanalysis of Reduced RIPEMD-160
Florian Mendel and Thomas Peyrin and Martin Schläffer and Lei Wang and Shuang Wu
2013/599 ( PDF )
Factoring RSA keys from certified smart cards: Coppersmith in the wild
Daniel J. Bernstein and Yun-An Chang and Chen-Mou Cheng and Li-Ping Chou and Nadia Heninger and Tanja Lange and Nicko van Someren
2013/598 ( PDF )
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version
Daehyun Strobel and Benedikt Driessen and Timo Kasper and Gregor Leander and David Oswald and Falk Schellenberg and Christof Paar
2013/597 ( PDF )
Efficient Pairings Computation on Jacobi Quartic Elliptic Curves
Sylvain Duquesne, Nadia El Mrabet and Emmanuel Fouotsa
2013/596 ( PDF )
Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gröbner Basis Methods -- an Experimental Study
Michael Shantz and Edlyn Teske
2013/595 ( PDF )
Enhanced certificate transparency and end-to-end encrypted mail
Mark D. Ryan
2013/594 ( PDF )
A Local-Global Approach to Solving Ideal Lattice Problems
Yuan Tian and Rongxin Sun and Xueyong Zhu
2013/593 ( PDF )
One-Sided Adaptively Secure Two-Party Computation
Carmit Hazay and Arpita Patra
2013/592 ( PDF )
Cryptanalysis of the Toorani-Falahati Hill Ciphers
Liam Keliher and Anthony Z. Delaney
2013/591 ( PDF )
Analysis of the Rainbow Tradeoff Algorithm Used in Practice
Jung Woo Kim and Jin Hong and Kunsoo Park
2013/590 ( PDF )
EyeDecrypt -- Private Interactions in Plain Sight
Andrea Forte and Juan Garay and Trevor Jim and Yevgeniy Vahlis
2013/589 ( PDF )
Smashing MASH-1
Vladimir Antipkin
2013/588 ( PDF )
SPHF-Friendly Non-Interactive Commitments
Michel Abdalla and Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval
2013/587 ( PDF )
ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments
Muhammad Rizwan Asghar and Mihaela Ion and Giovanni Russello and Bruno Crispo
2013/586 ( PDF )
Generic related-key and induced chosen IV attacks using the method of key differentiation
Enes Pasalic and Yongzhuang Wei
2013/585 ( PDF )
On Algebraic Immunity of Trace Inverse Functions over Finite Fields with Characteristic Two
Xiutao Feng and Guang Gong
2013/584 ( PDF )
Cryptanalysis of GOST R Hash Function
Zongyue Wang, Hongbo Yu, Xiaoyun Wang
2013/583 ( PDF )
polynomial selection for the number field sieve in geometric view
Min yang, Qingshu Meng, Zhangyi Wang, Lina Wang, Huanguo Zhang
2013/582 ( PDF )
The Special Number Field Sieve in $\F _{p^{n}}$, Application to Pairing-Friendly Constructions
Antoine Joux and Cécile Pierrot
2013/581 ( PDF )
PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones
Bingsheng Zhang, Qin Zhan, Junfei Wang, Kui Ren, Cong Wang, Di Ma
2013/580 ( PDF )
Random Projections, Graph Sparsification, and Differential Privacy
Jalaj Upadhyay
2013/579 ( PDF )
On Measurable Side-Channel Leaks inside ASIC Design Primitives
Takeshi Sugawara and Daisuke Suzuki and Minoru Saeki and Mitsuru Shiozaki and Takeshi Fujino
2013/578 ( PDF )
A Method For Generation Of High-Nonlinear S-Boxes Based On Gradient Descent
Oleksandr Kazymyrov and Valentyna Kazymyrova and Roman Oliynykov
2013/577 ( PDF )
Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique
Luís T. A. N. Brandão
2013/576 ( PDF )
Extended Criterion for Absence of Fixed Points
Oleksandr Kazymyrov and Valentyna Kazymyrova
2013/575 ( PDF )
Equivalence between MAC and PRF for Blockcipher based Constructions
Nilanjan Datta and Mridul Nandi
2013/574 ( PDF )
On the Minimum Number of Multiplications Necessary for Universal Hash Constructions
Mridul Nandi
2013/573 ( PDF )
Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE
Leibo Li and Keting Jia and Xiaoyun Wang
2013/572 ( PDF )
Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher
Goutam Paul and Subhamoy Maitra and Anupam Chattopadhyay
2013/571 ( PDF )
Efficient General-Adversary Multi-Party Computation
Martin Hirt and Daniel Tschudi
2013/570 ( PDF )
New Efficient Identity-Based Encryption From Factorization
Jun Shao and Licheng Wang and Xiaolei Dong and Zhenfu Cao
2013/569 ( PDF )
More Efficient Cryptosystems From $k^{th}$-Power Residues
Zhenfu Cao and Xiaolei Dong and Licheng Wang and Jun Shao
2013/568 ( PDF )
Cryptanalysis of the Speck Family of Block Ciphers
Farzaneh Abed and Eik List and Stefan Lucks and Jakob Wenzel
2013/567 ( PDF )
KDM Security in the Hybrid Framework
Gareth T. Davies and Martijn Stam
2013/566 ( PDF )
Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation
Jeroen Delvaux and Ingrid Verbauwhede
2013/565 ( PDF )
Non-Malleable Coding Against Bit-wise and Split-State Tampering
Mahdi Cheraghchi and Venkatesan Guruswami
2013/564 ( PDF )
Capacity of Non-Malleable Codes
Mahdi Cheraghchi and Venkatesan Guruswami
2013/563 ( PDF )
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
Zvika Brakerski and Guy N. Rothblum
2013/562 ( PDF )
Self-pairings on supersingular elliptic curves with embedding degree $three$
Binglong Chen and Chang-An~Zhao
2013/561 ( PDF )
Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis
Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus
2013/560 ( PDF )
Sometimes-Recurse Shuffle: Almost-Random Permutations in Logarithmic Expected Time
Ben Morris and Phillip Rogaway
2013/559 ( PDF )
A Constructive Approach to Functional Encryption
Christian Matt and Ueli Maurer
2013/558 ( PDF )
Practical approaches to varying network size in combinatorial key predistribution schemes
Kevin Henry and Maura B. Paterson and Douglas R. Stinson
2013/557 ( PDF )
Black-Box Obfuscation for d-CNFs
Zvika Brakerski and Guy N. Rothblum
2013/556 ( PDF )
Algebraic Aspects of the Russian Hash Standard GOST R 34.11-2012
Oleksandr Kazymyrov and Valentyna Kazymyrova
2013/555 ( PDF )
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design
Ueli Maurer and Björn Tackmann and Sandro Coretti
2013/554 ( PDF )
Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic
Pablo Rauzy and Sylvain Guilley and Zakaria Najm
2013/553 ( PDF )
Multi-Valued Byzantine Broadcast: the $t < n$ Case
Martin Hirt and Pavel Raykov
2013/552 ( PDF )
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation
Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner
2013/551 ( PDF )
Puzzle Encryption Algorithm
Gregory Alvarez and Charles Berenguer
2013/550 ( -- withdrawn -- )
More Efficient Cryptosystems From k-th Power Residues
Zhenfu Cao and Xiaolei Dong and Licheng Wang and Jun Shao
2013/549 ( PDF )
Equations System coming from Weil descent and subexponential attack for algebraic curve cryptosystem
Koh-ichi Nagao
2013/548 ( PDF )
Decomposition formula of the Jacobian group of plane curve
Koh-ichi Nagao
2013/547 ( PDF )
Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks
Siwei Sun and Lei Hu and Ling Song and Yonghong Xie and Peng Wang
2013/546 ( PDF )
TRS-80 with a grain of salt
Jean-Marie Chauvet
2013/545 ( PDF )
Private Over-threshold Aggregation Protocols over Distributed Databases
Myungsun Kim and Abedelaziz Mohaisen and Jung Hee Cheon and Yongdae Kim
2013/544 ( PDF )
Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes
Christian Hanser and Daniel Slamanig
2013/543 ( PDF )
Cryptanalysis of the SIMON Family of Block Ciphers
Hoda A. Alkhzaimi and Martin M. Lauridsen
2013/542 ( PDF )
Searching for Nonlinear Feedback Shift Registers with Parallel Computing
Przemysław Dąbrowski and Grzegorz Łabuzek and Tomasz Rachwalik and Janusz Szmidt
2013/541 ( PDF )
Lattice-Based FHE as Secure as PKE
Zvika Brakerski and Vinod Vaikuntanathan
2013/540 ( PDF )
On the security of a password-only authenticated three-party key exchange protocol
Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won
2013/539 ( PDF )
Rebound attacks on Stribog
Riham AlTawy and Aleksandar Kircanski and Amr M. Youssef
2013/538 ( PDF )
Practical Issues with TLS Client Certificate Authentication
Arnis Parsovs
2013/537 ( PDF )
Inter-FSP Funds Transfer Protocol
Amir Herzberg and Shay Nachmani
2013/536 ( PDF )
A Three-Level Sieve Algorithm for the Shortest Vector Problem
Feng Zhang and Yanbin Pan and Gengran Hu
2013/535 ( PDF )
Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms
Sujoy Sinha Roy and Junfeng Fan and Ingrid Verbauwhede
2013/534 ( PDF )
Efficient Unobservable Anonymous Reporting against Strong Adversaries
Nethanel Gelernter and Amir Herzberg
2013/533 ( PDF )
Gossip Latin Square and The Meet-All Gossipers Problem
Nethanel Gelernter and Amir Herzberg
2013/532 ( PDF )
On a Relation between the Ate Pairing and the Weil Pairing for Supersingular Elliptic Curves
Takakazu Satoh
2013/531 ( PDF )
On the Limits of Provable Anonymity
Nethanel Gelernter and Amir Herzberg
2013/530 ( PDF )
The Parallel-Cut Meet-In-The-Middle Attack
Ivica Nikolic and Lei Wang and Shuang Wu
2013/529 ( PDF )
How to Withstand Mobile Virus Attacks, Revisited
Joshua Baron and Karim El Defrawy and Joshua Lampkins and Rafail Ostrovsky
2013/528 ( PDF )
Anonymous HIBE from Standard Assumptions over Type-3 Pairings using Dual System Encryption
Somindu C. Ramanna and Palash Sarkar
2013/527 ( PDF )
The Spammed Code Offset Method
Boris Skoric and Niels de Vreede
2013/526 ( PDF )
Differential and Linear Cryptanalysis of Reduced-Round Simon
Farzaneh Abed and Eik List and Stefan Lucks and Jakob Wenzel
2013/525 ( PDF )
Catena : A Memory-Consuming Password-Scrambling Framework
Christian Forler and Stefan Lucks and Jakob Wenzel
2013/524 ( PDF )
Threshold Secret Image Sharing
Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang, Wen Wang and YaWei Ren
2013/523 ( PDF )
White-Box Security Notions for Symmetric Encryption Schemes
Cécile Delerablée and Tancrède Lepoint and Pascal Paillier and Matthieu Rivain
2013/522 ( PDF )
The Resistance of PRESENT-80 Against Related-Key Differential Attacks
Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk and Huaxiong Wang
2013/521 ( PDF )
Multiple Limited-Birthday Distinguishers and Applications
Jérémy Jean and María Naya-Plasencia and Thomas Peyrin
2013/520 ( PDF )
Locally Updatable and Locally Decodable Codes
Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky
2013/519 ( PDF )
Montgomery Multiplication Using Vector Instructions
Joppe W. Bos and Peter L. Montgomery and Daniel Shumow and Gregory M. Zaverucha
2013/518 ( -- withdrawn -- )
Universal Leaky Random Oracle Model
Guangjun Fan and Yongbin Zhou and Dengguo Feng
2013/517 ( PDF )
Improvement of One Adaptive Oblivious Transfer Scheme
Zhengjun Cao and Lihua Liu
2013/516 ( PDF )
Algebraic MACs and Keyed-Verification Anonymous Credentials
Melissa Chase and Sarah Meiklejohn and Gregory M. Zaverucha
2013/515 ( PDF )
When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol
Changyu Dong and Liqun Chen and Zikai Wen
2013/514 ( PDF )
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited
Jia Xu and Jianying Zhou
2013/513 ( PDF )
Enforcing Language Semantics Using Proof-Carrying Data
Stephen Chong and Eran Tromer and Jeffrey A. Vaughan
2013/512 ( PDF )
Rounding LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
Jingguo Bi and Phong Q. Nguyen
2013/511 ( PDF )
Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT
Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, and Mohammad Reza Aref
2013/510 ( PDF )
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers
Johannes Buchmann and Daniel Cabarcas and Florian Göpfert and Andreas Hülsing and Patrick Weiden
2013/509 ( PDF )
Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation
Susan Hohenberger and Amit Sahai and Brent Waters
2013/508 ( PDF )
Multi-Key Searchable Encryption
Raluca Ada Popa and Nickolai Zeldovich
2013/507 ( PDF )
SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge
Eli Ben-Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer and Madars Virza
2013/506 ( PDF )
A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA
Pablo Rauzy and Sylvain Guilley
2013/505 ( PDF )
Improvement of One Anonymous Identity-Based Encryption
Zhengjun Cao and Lihua Liu
2013/504 ( PDF )
A Comparison of Double Point Multiplication Algorithms and their Implementation over Binary Elliptic Curves
Reza Azarderakhsh and Koray Karabina
2013/503 ( PDF )
On secret sharing with nonlinear product reconstruction
Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Carles Padro and Chaoping Xing
2013/502 ( PDF )
Proving TLS-attack related open biases of RC4
Santanu Sarkar and Sourav Sen Gupta and Goutam Paul and Subhamoy Maitra
2013/501 ( PDF )
Type-Based Analysis of Protected Storage in the TPM (full version)
Jianxiong Shao and Dengguo Feng and Yu Qin
2013/500 ( PDF )
Obfuscating Branching Programs Using Black-Box Pseudo-Free Groups
Ran Canetti and Vinod Vaikuntanathan
2013/499 ( PDF )
Limits on the Power of Cryptographic Cheap Talk
Pavel Hubacek and Jesper Buus Nielsen and Alon Rosen
2013/498 ( PDF )
Non-Malleable Codes from Two-Source Extractors
Stefan Dziembowski and Tomasz Kazana and Maciej Obremski
2013/497 ( PDF )
Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme
Zhengjun Cao and Hanyue Cao
2013/496 ( PDF )
Rational Protocol Design: Cryptography Against Incentive-driven Adversaries
Juan Garay and Jonathan Katz and Ueli Maurer and Bjoern Tackmann and Vassilis Zikas
2013/495 ( PDF )
Revocable IBE Systems with Almost Constant-size Key Update
Le Su and Hoon Wei Lim and San Ling and Huaxiong Wang
2013/494 ( PDF )
Differential Fault Attack against Grain family with very few faults and minimal assumptions
Santanu Sarkar and Subhadeep Banik and Subhamoy Maitra
2013/493 ( PDF )
A new class of semi-bent quadratic Boolean functions
Chunming Tang and Yanfeng Qi
2013/492 ( PDF )
Cryptographically Enforced RBAC
Anna Lisa Ferrara and George Fuchsbauer and Bogdan Warinschi
2013/491 ( PDF )
Improved OT Extension for Transferring Short Secrets
Vladimir Kolesnikov and Ranjit Kumaresan
2013/490 ( PDF )
For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes
Masoumeh Safkhani, Nasour Bagheri
2013/489 ( PDF )
An Efficient Scheme for Centralized Group Key Management in Collaborative Environments
Constantinos Patsakis and Agusti Solanas
2013/488 ( PDF )
Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency
Kwangsu Lee and Dong Hoon Lee
2013/487 ( PDF )
Classification of Elliptic/hyperelliptic Curves with Weak Coverings against the GHS attack under an Isogeny Condition
Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao
2013/486 ( -- withdrawn -- )
Handling Authentication and Detection Probability in Multi-tag RFID Environment
Subhasish Dhal and Indranil Sengupta
2013/485 ( -- withdrawn -- )
A New Object Searching Protocol for Multi-tag RFID
Subhasish Dhal and Indranil Sengupta
2013/484 ( -- withdrawn -- )
Efficient Public Integrity Checking for Cloud Data Sharing with Multi-User Modification
Jiawei Yuan and Shucheng Yu
2013/483 ( PDF )
A Variant of Coppersmith's Algorithm with Improved Complexity and Efficient Exhaustive Search
Jean-Sébastien Coron and Jean-Charles Faugère and Guénaël Renault and Rina Zeitoun
2013/482 ( PDF )
Bounds in Shallows and in Miseries
Céline Blondeau and Andrey Bogdanov and Gregor Leander
2013/481 ( PDF )
Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012
Yosuke Todo and Keita Xagawa
2013/480 ( PDF )
Efficient Multiparty Protocols via Log-Depth Threshold Formulae
Gil Cohen, Ivan Bjerre Damg{\aa}rd, Yuval Ishai, Jonas K\"{o}lker, Peter Bro Miltersen, Ran Raz and Ron D. Rothblum
2013/479 ( PDF )
Security analysis of Quantum-Readout PUFs in the case of challenge-estimation attacks
B. Skoric
2013/478 ( PDF )
Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach
Stefan G. Weber
2013/477 ( PDF )
Golden Sequence for the PPSS Broadcast Encryption Scheme with an Asymmetric Pairing
Renaud Dubois and Margaux Dugardin and Aurore Guillevic
2013/476 ( PDF )
Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA
Sourav Sen Gupta and Subhamoy Maitra and Willi Meier and Goutam Paul and Santanu Sarkar
2013/475 ( PDF )
A note on verifying the APN property
Pascale Charpin and Gohar M. Kyureghyan
2013/474 ( PDF )
Eavesdropping or Disrupting a Communication --- On the Weakness of Quantum Communications
Zhengjun Cao
2013/473 ( PDF )
The Norwegian Internet Voting Protocol
Kristian Gjøsteen
2013/472 ( PDF )
Partially blind password-based signatures using elliptic curves
Kristian Gjøsteen
2013/471 ( PDF )
Obfuscating Conjunctions
Zvika Brakerski and Guy N. Rothblum
2013/470 ( PDF )
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions
Martin R. Albrecht and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret
2013/469 ( PDF )
Verifiable Delegation of Computation on Outsourced Data
Michael Backes and Dario Fiore and Raphael M. Reischuk
2013/468 ( PDF )
How To Construct Extractable One-Way Functions Against Uniform Adversaries
Nir Bitansky and Ran Canetti and Omer Paneth
2013/467 ( PDF )
Analysis of BLAKE2
Jian Guo and Pierre Karpman and Ivica Nikolic and Lei Wang and Shuang Wu
2013/466 ( PDF )
Efficient computation of addition-subtraction chains using generalized continued Fractions
Amadou Tall and Ali Yassin Sanghare
2013/465 ( PDF )
Practical & Provably Secure Distance-Bounding
Ioana Boureanu and Aikaterini Mitrokotsa and Serge Vaudenay
2013/464 ( PDF )
Towards A Practical JCJ / Civitas Implementation
Stephan Neumann and Christian Feier and Melanie Volkamer and Reto Koenig
2013/463 ( PDF )
Secret Key Cryptosystem based on Polar Codes over Binary Erasure Channel
Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref
2013/462 ( PDF )
VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
Qingji Zheng and Shouhuai Xu and Giuseppe Ateniese
2013/461 ( PDF )
HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware
Zongbin Liu and Neng Gao and Jiwu Jing and Peng Liu
2013/460 ( PDF )
Solving Terminal Revocation in EAC by Augmenting Terminal Authentication
Rafik Chaabouni
2013/459 ( PDF )
Reset Indifferentiability and its Consequences
Paul Baecher and Christina Brzuska and Arno Mittelbach
2013/458 ( PDF )
Exponentiating in Pairing Groups
Joppe W. Bos and Craig Costello and Michael Naehrig
2013/457 ( PDF )
Deduction Soundness: Prove One, Get Five for Free
Florian Böhl and Véronique Cortier and Bogdan Warinschi
2013/456 ( PDF )
On the Security of Group-based Proxy Re-encryption Scheme
Purushothama B R and B B Amberker
2013/455 ( PDF )
Another Nail in the Coffin of White-Box AES Implementations
Tancrède Lepoint and Matthieu Rivain
2013/454 ( PDF )
How to Use Indistinguishability Obfuscation: Deniable Encryption, and More
Amit Sahai and Brent Waters
2013/453 ( PDF )
Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags
Nasour Bagheri, Masoumeh Safkhani
2013/452 ( PDF )
Secure Channel Coding Schemes based on Polar Codes
Behnam Mafakheri, Taraneh Eghlidos, Hossein Pilaram
2013/451 ( PDF )
Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits
Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova and Amit Sahai and Brent Waters
2013/450 ( PDF )
Revisiting the BGE Attack on a White-Box AES Implementation
Yoni De Mulder and Peter Roelse and Bart Preneel
2013/449 ( PDF )
A Note On the Storage Requirement for AKS Primality Testing Algorithm
Zhengjun Cao
2013/448 ( PDF )
Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack
Yuval Yarom and Katrina Falkner
2013/447 ( PDF )
Dynamic Runtime Methods to Enhance Private Key Blinding
Karine Gandolfi-Villegas and Nabil Hamzi
2013/446 ( PDF )
Weakness of F_{3^{6*509}} for Discrete Logarithm Cryptography
Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodr\'iguez-Henr\'iquez
2013/445 ( PDF )
Implementing Lightweight Block Ciphers on x86 Architectures
Ryad Benadjila and Jian Guo and Victor Lomné and Thomas Peyrin
2013/444 ( PDF )
Sequential message authentication code without random oracles
Bin Wang and Xiaojing Hong
2013/443 ( PDF )
Optimally Anonymous and Transferable Conditional E-cash
Jiangxiao Zhang. Hua Guo. Zhoujun Li. Chang Xu
2013/442 ( PDF )
On Fair Exchange, Fair Coins and Fair Sampling
Shashank Agrawal and Manoj Prabhakaran
2013/441 ( -- withdrawn -- )
On Stochastic Security of Java Crypto and NIST DRBG Pseudorandom Sequences
Yongge Wang
2013/440 ( PDF )
Revisiting Conditional R\'enyi Entropies and Generalizing Shannon's Bounds in Information Theoretically Secure Encryption
Mitsugu Iwamoto and Junji Shikata
2013/439 ( PDF )
Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID
Peter Pessl and Michael Hutter
2013/438 ( PDF )
Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations
Johann Heyszl and Andreas Ibing and Stefan Mangard and Fabrizio De Santis and Georg Sigl
2013/437 ( PDF )
A Uniform Min-Max Theorem with Applications in Cryptography
Salil Vadhan and Colin Jia Zheng
2013/436 ( PDF )
Fast Exhaustive Search for Quadratic Systems in $\mathbb{F}_2$ on FPGAs --- Extended Version
Charles Bouillaguet and Chen-Mou Cheng and Tung Chou and Ruben Niederhagen and Bo-Yin Yang
2013/435 ( PDF )
Efficient Cryptosystems From $2^k$-th Power Residue Symbols
Marc Joye and Benoit Libert
2013/434 ( PDF )
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures
Susan Hohenberger and Amit Sahai and Brent Waters
2013/433 ( PDF )
On Symmetric Encryption with Distinguishable Decryption Failures
Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam
2013/432 ( PDF )
How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling
Eric Brier and David Naccache and Li-yao Xia
2013/431 ( PDF )
Practical-Time Attacks Against Reduced Variants of MISTY1
Orr Dunkelman and Nathan Keller
2013/430 ( PDF )
Security of the Misty Structure Beyond the Birthday Bound
Jooyoung Lee
2013/429 ( PDF )
DupLESS: Server-Aided Encryption for Deduplicated Storage
Mihir Bellare and Sriram Keelveedhi and Thomas Ristenpart
2013/428 ( PDF )
Faster 128-EEA3 and 128-EIA3 Software
Roberto Avanzi and Billy Bob Brumley
2013/427 ( PDF )
Toeplitz matrix-vector product based GF(2^n) shifted polynomial basis multipliers for all irreducible pentanomials
Jiangtao Han and Haining Fan
2013/426 ( PDF )
Efficient Garbling from a Fixed-Key Blockcipher
Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi and Phillip Rogaway
2013/425 ( PDF )
Break WEP Faster with Statistical Analysis
Rafik Chaabouni
2013/424 ( PDF )
Instantiating Random Oracles via UCEs
Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi
2013/423 ( PDF )
Locally Computable UOWHF with Linear Shrinkage
Benny Applebaum and Yoni Moses
2013/422 ( PDF )
Private Database Queries Using Somewhat Homomorphic Encryption
Dan Boneh and Craig Gentry and Shai Halevi and Frank Wang and David J. Wu
2013/421 ( PDF )
Light-weight primitive, feather-weight security? A cryptanalytic knock-out. (Preliminary results)
Valentina Banciu and Simon Hoerder and Dan Page
2013/420 ( PDF )
The Holey Grail: A special score function for non-binary traitor tracing
B. Skoric and J.-J. Oosterwijk and J. Doumen
2013/419 ( PDF )
How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE
Rikke Bendlin and Sara Krehbiel and Chris Peikert
2013/418 ( PDF )
On Tight Security Proofs for Schnorr Signatures
Nils Fleischhacker and Tibor Jager and Dominique Schröder
2013/417 ( PDF )
The Improved Cube Attack on Grain-v1
Yongjuan Wang and Liren Ding and Wenbao Han and Xiangyu Wang
2013/416 ( PDF )
Computational Fuzzy Extractors
Benjamin Fuller and Xianrui Meng and Leonid Reyzin
2013/415 ( PDF )
Short collision search in arbitrary SL2 homomorphic hash functions
Ciaran Mullan and Boaz Tsaban
2013/414 ( PDF )
A novel certificateless deniable authentication protocol
Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Qianna Xie, Fagen Li
2013/413 ( PDF )
Policy-Based Signatures
Mihir Bellare and Georg Fuchsbauer
2013/412 ( PDF )
Moduar Form Aprroach to Solving Lattice Problems
Yuan Tian, Xueyong Zhu, Rongxin Sun
2013/411 ( PDF )
Security Analysis of Lightweight Authentication Protocol from WISTP 2013
Wang Shao-Hui, Xiao Fu, Chen Dan-wei, Wang Ru-chuan
2013/410 ( PDF )
Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI
Yossi Gilad and Amir Herzberg
2013/409 ( PDF )
Order-Preserving Encryption Secure Beyond One-Wayness
Tal Malkin and Isamu Teranishi and Moti Yung
2013/408 ( PDF )
Delegatable Functional Signatures
Michael Backes and Sebastian Meiser and Dominique Schröder
2013/407 ( PDF )
Automated Security Proofs for Almost-Universal Hash for MAC verification
Martin Gagné and Pascal Lafourcade and Yassine Lakhnech
2013/406 ( -- withdrawn -- )
Attribute-Based Server-Aided Verification Signature
Zhiwei Wang and Ruirui Xie and Wei Zhang and Liwen He and Guozi Sun and Wei Chen
2013/405 ( PDF )
New Quadratic Bent Functions in Polynomial Forms with Coefficients in Extension Fields
Chunming Tang, Yanfeng Qi, Maozhi Xu
2013/404 ( PDF )
The SIMON and SPECK Families of Lightweight Block Ciphers
Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
2013/403 ( PDF )
Function-Private Subspace-Membership Encryption and Its Applications
Dan Boneh and Ananth Raghunathan and Gil Segev
2013/402 ( PDF )
Efficient Two-Pass Anonymous Identity Authentication Using Smart Card
Jue-Sam Chou1*, Chun-Hui Huang2, Yu-Siang Huang3, Yalin Chen4
2013/401 ( PDF )
Functional Signatures and Pseudorandom Functions
Elette Boyle and Shafi Goldwasser and Ioana Ivan
2013/400 ( PDF )
A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic
Razvan Barbulescu and Pierrick Gaudry and Antoine Joux and Emmanuel Thomé
2013/399 ( PDF )
Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol
Roel Peeters and Jens Hermans
2013/398 ( PDF )
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
Colin Boyd and Cas Cremers and Michèle Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila
2013/397 ( PDF )
Practical Secure Logging: Seekable Sequential Key Generators
Giorgia Azzurra Marson and Bertram Poettering
2013/396 ( PDF )
On the Practical Security of a Leakage Resilient Masking Scheme
Emmanuel Prouff and Matthieu Rivain and Thomas Roche
2013/394 ( PDF )
A Public Key Cryptoscheme Using Bit-pair Shadows
Shenghui Su and Shuwang Lv and Maozhi Xu
2013/393 ( PDF )
Strongly Secure One-round Group Authenticated Key Exchange in the Standard Model
Yong Li and Zheng Yang
2013/392 ( PDF )
Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves
Christian Hanser and Daniel Slamanig
2013/391 ( PDF )
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full $\mbox{AES}^{2}$
Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
2013/390 ( PDF )
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
Keita Emura and Goichiro Hanaoka and Koji Nuida and Go Ohtake and Takahiro Matsuda and Shota Yamada
2013/389 ( PDF )
A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes
Jan-Jaap Oosterwijk and Boris Skoric and Jeroen Doumen
2013/388 ( PDF )
Parallel Gauss Sieve Algorithm : Solving the SVP in the Ideal Lattice of 128-dimensions
Tsukasa Ishiguro and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyoshi Takagi
2013/387 ( PDF )
Cryptographically Protected Prefixes for Location Privacy in IPv6
Jonathan Trostle and Hosei Matsuoka and James Kempf and Toshiro Kawahara and Ravi Jain
2013/386 ( PDF )
Side Channel Attacks against Pairing over Theta Functions
Nadia El Mrabet
2013/385 ( -- withdrawn -- )
Cryptanalysis of ultralightweight RFID authentication protocol
Umar Mujahid, M.Najam-ul-islam, Jameel Ahmed, Usman Mujahid
2013/384 ( PDF )
Sequential Aggregate Signatures Made Shorter
Kwangsu Lee and Dong Hoon Lee and Moti Yung
2013/383 ( PDF )
Lattice Signatures and Bimodal Gaussians
Léo Ducas and Alain Durmus and Tancrède Lepoint and Vadim Lyubashevsky
2013/382 ( PDF )
To Hash or Not to Hash Again? (In)differentiability Results for H^2 and HMAC
Yevgeniy Dodis and Thomas Ristenpart and John Steinberger and Stefano Tessaro
2013/381 ( -- withdrawn -- )
Breaking the Even-Mansour Hash Function: Collision and Preimage Attacks on JH and Gr{\o}stl
Bingke Ma and Bao Li and Ronglin Hao
2013/380 ( PDF )
Comments on Three Multi-Server Authentication Protocols
Yalin Chen 1, *Jue-Sam Chou2, Wen-Yi Tsai 3
2013/379 ( PDF )
Delegatable Pseudorandom Functions and Applications
Aggelos Kiayias and Stavros Papadopoulos and Nikos Triandopoulos and Thomas Zacharias
2013/378 ( PDF )
A note on quantum related-key attacks
Martin Roetteler and Rainer Steinwandt
2013/377 ( PDF )
An Algebraic Framework for Diffie-Hellman Assumptions
Alex Escala and Gottfried Herold and Eike Kiltz and Carla Ràfols and Jorge Villar
2013/376 ( PDF )
An Accurate Probabilistic Reliability Model for Silicon PUFs
Roel Maes
2013/375 ( PDF )
NaCl on 8-Bit AVR Microcontrollers
Michael Hutter and Peter Schwabe
2013/374 ( PDF )
A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN
Majid Bayat, Mohammad Reza Aref
2013/373 ( PDF )
Injective Encoding to Elliptic Curves
Pierre-Alain Fouque and Antoine Joux and Mehdi Tibouchi
2013/372 ( PDF )
Practical Bootstrapping in Quasilinear Time
Jacob Alperin-Sheriff and Chris Peikert
2013/371 ( PDF )
Domain-Polymorphic Programming of Privacy-Preserving Applications
Dan Bogdanov and Peeter Laud and Jaak Randmets
2013/370 ( PDF )
Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions
François-Xavier Standaert and Olivier Pereira and Yu Yu
2013/369 ( PDF )
Block Ciphers that are Easier to Mask: How Far Can we Go?
Benoît Gérard and Vincent Grosso and María Naya-Plasencia and François-Xavier Standaert
2013/368 ( PDF )
Security in $O(2^n)$ for the Xor of Two Random Permutations\\ -- Proof with the standard $H$ technique--
Jacques Patarin
2013/367 ( PDF )
On the Security of TLS-DH and TLS-RSA in the Standard Model
Florian Kohlar and Sven Schäge and Jörg Schwenk
2013/366 ( PDF )
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
Pierre-Alain Fouque and Jérémy Jean and Thomas Peyrin
2013/365 ( PDF )
Efficient eCK-secure Authenticated Key Exchange Protocols in the Standard Model
Zheng Yang
2013/364 ( PDF )
On the Achievability of Simulation-Based Security for Functional Encryption
Angelo De Caro and Vincenzo Iovino Abhishek Jain and Adam O'Neill and Omer Paneth and Giuseppe Persiano
2013/363 ( PDF )
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SE(1)PKC.-- Along with a presentation of K(XII)SE(1)PKC over the extension field extensively used for present day various storage and transmission systems --
2013/362 ( PDF )
A Fast Implementation of the Optimal Ate Pairing over BN curve on Intel Haswell Processor
2013/361 ( PDF )
Linearly Homomorphic Structure-Preserving Signatures and Their Applications
Benoit Libert and Thomas Peters and Marc Joye and Moti Yung
2013/360 ( PDF )
Achieving the limits of the noisy-storage model using entanglement sampling
Frédéric Dupuis and Omar Fawzi and Stephanie Wehner
2013/359 ( PDF )
A heuristic for finding compatible differential paths with application to HAS-160
Aleksandar Kircanski and Riham AlTawy and Amr M. Youssef
2013/358 ( PDF )
Marc Stevens
2013/357 ( PDF )
The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE
Dmitry Khovratovich and Christian Rechberger
2013/356 ( PDF )
Verifying Computations with State (Extended Version)
Benjamin Braun and Ariel J. Feldman and Zuocheng Ren and Srinath Setty and Andrew J. Blumberg and Michael Walfish
2013/355 ( PDF )
New Attacks against Transformation-Based Privacy-Preserving Linear Programming
Peeter Laud and Alisa Pankova
2013/354 ( PDF )
Programmable Hash Functions in the Multilinear Setting
Eduarda S.V. Freire and Dennis Hofheinz and Kenneth G. Paterson and Christoph Striecks
2013/353 ( PDF )
Profiling DPA: Efficacy and efficiency trade-offs
Carolyn Whitnall and Elisabeth Oswald
2013/352 ( PDF )
Constrained Pseudorandom Functions and Their Applications
Dan Boneh and Brent Waters
2013/351 ( PDF )
Time-Optimal Interactive Proofs for Circuit Evaluation
Justin Thaler
2013/350 ( PDF )
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions
Paul Baecher and Pooya Farshim and Marc Fischlin and Martijn Stam
2013/349 ( PDF )
A Dynamic Tradeoff Between Active and Passive Corruptions in Secure Multi-Party Computation
Martin Hirt and Christoph Lucas and Ueli Maurer
2013/348 ( PDF )
Multi-file proofs of retrievability for cloud storage auditing
Bin Wang and Xiaojing Hong
2013/347 ( PDF )
STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data
Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez and Palash Sarkar
2013/346 ( PDF )
Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA
Elke De Mulder and Michael Hutter and Mark E. Marson and Peter Pearson
2013/345 ( PDF )
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
Arnab Roy and Srinivas Vivek
2013/344 ( PDF )
Limits of provable security for homomorphic encryption
Andrej Bogdanov and Chin Ho Lee
2013/343 ( PDF )
Quantum one-time programs
Anne Broadbent and Gus Gutoski and Douglas Stebila
2013/342 ( PDF )
Attribute-Based Encryption for a Subclass of Circuits with Bounded Depth from Lattices
Xiang Xie and Rui Xue
2013/341 ( PDF )
Trapdoor Smooth Projective Hash Functions
Fabrice Benhamouda and David Pointcheval
2013/340 ( PDF )
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
Craig Gentry and Amit Sahai and Brent Waters
2013/339 ( PDF )
On the Security of the TLS Protocol: A Systematic Analysis
Hugo Krawczyk and Kenneth G. Paterson and Hoeteck Wee
2013/338 ( PDF )
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
Yevgeniy Dodis and David Pointcheval and Sylvain Ruhault and Damien Vergnaud and Daniel Wichs
2013/337 ( PDF )
Attribute-Based Encryption for Circuits
Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee
2013/336 ( -- withdrawn -- )
A Novel Technique in Linear Cryptanalysis
Wen-Long Sun Jie Guan Lin Ding
2013/335 ( PDF )
Parallel and Dynamic Searchable Symmetric Encryption
Seny Kamara and Charalampos Papamanthou
2013/334 ( PDF )
Protecting PUF Error Correction by Codeword Masking
Dominik Merli and Frederic Stumpf and Georg Sigl
2013/333 ( PDF )
Double-authentication-preventing signatures
Bertram Poettering and Douglas Stebila
2013/332 ( PDF )
A method for obtaining lower bounds on the higher order nonlinearity of Boolean function
Mikhail S. Lobanov
2013/331 ( PDF )
New Constructions and Applications of Trapdoor DDH Groups
Yannick Seurin
2013/330 ( PDF )
Trapdoor Privacy in Asymmetric Searchable Encryption Schemes
Afonso Arriaga and Qiang Tang and Peter Ryan
2013/329 ( PDF )
Protocol Variants and Electronic Identification
Kristian Gjøsteen
2013/328 ( PDF )
Towards Finding Optimal Differential Characteristics for ARX: Application to Salsa20
Nicky Mouha and Bart Preneel
2013/327 ( PDF )
A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack
Shenghui Su and Tao Xie and Shuwang Lv
2013/326 ( PDF )
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig
Mihir Bellare and Sarah Meiklejohn and Susan Thomson
2013/325 ( PDF )
Elligator: Elliptic-curve points indistinguishable from uniform random strings
Daniel J. Bernstein and Mike Hamburg and Anna Krasnova and Tanja Lange
2013/324 ( PDF )
Sieve-in-the-Middle: Improved MITM Attacks (Full Version)
Anne Canteaut and María Naya-Plasencia and Bastien Vayssiere
2013/323 ( PS PS.GZ PDF )
Encryption Schemes with Post-Challenge Auxiliary Inputs
Tsz Hon Yuen and Ye Zhang and Siu-Ming Yiu
2013/322 ( PDF )
BLAKE2: simpler, smaller, fast as MD5
Jean-Philippe Aumasson and Samuel Neves and Zooko Wilcox-O'Hearn and Christian Winnerlein
2013/321 ( PDF )
Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security
Keita Emura and Atsuko Miyaji and Mohammad Shahriar Rahman and Kazumasa Omote
2013/320 ( PDF )
Instantaneous Frequency Analysis
Roman Korkikian and David Naccache and Guilherme Ozari de Almeida
2013/319 ( PDF )
On the use of continued fractions for stream ciphers
Amadou Moctar Kane
2013/318 ( PDF )
Fully-Anonymous Functional Proxy-Re-Encryption
Yutaka Kawai and Katsuyuki Takashima
2013/317 ( PDF )
Anon-Pass: Practical Anonymous Subscriptions
Michael Z. Lee and Alan M. Dunn and Jonathan Katz and Brent Waters and Emmett Witchel
2013/316 ( PDF )
Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations
José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and François Dupressoir
2013/315 ( PDF )
Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes
Albrecht Petzoldt
2013/314 ( PDF )
Keyed Side-Channel Based Hashing for IP Protection using Wavelets
Timo Bartkewitz
2013/313 ( PDF )
Pairing Inversion via Non-degenerate Auxiliary Pairings
Seunghwan Chang and Hoon Hong and Eunjeong Lee and Hyang-Sook Lee
2013/312 ( PDF )
Families of fast elliptic curves from Q-curves
Benjamin Smith
2013/311 ( PDF )
Four-dimensional GLV via the Weil restriction
Aurore Guillevic and Sorina Ionica
2013/310 ( PDF )
MinimaLT: Minimal-latency Networking Through Better Security
W. Michael Petullo and Xu Zhang and Jon A. Solworth and Daniel J. Bernstein and Tanja Lange
2013/309 ( PDF )
Bypassing Passkey Authentication in Bluetooth Low Energy
Tomas Rosa
2013/308 ( PDF )
Lattice-Based Group Signatures with Logarithmic Signature Size
Fabien Laguillaumie and Adeline Langlois and Benoit Libert and Damien Stehle
2013/307 ( PDF )
Maliciously Circuit-Private FHE
Rafail Ostrovsky and Anat Paskin-Cherniavsky and Beni Paskin-Cherniavsky
2013/306 ( PDF )
Solving a $6120$-bit DLP on a Desktop Computer
Faruk G\"olo\u{g}lu and Robert Granger and Gary McGuire and Jens Zumbr\"agel
2013/305 ( PDF )
Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis
Sonia Belaid and Fabrizio De Santis and Johann Heyszl and Stefan Mangard and Marcel Medwed and Jorn-Marc Schmidt and Francois-Xavier Standaert and Stefan Tillich
2013/304 ( PDF )
Secure PRNG Seeding on Commercial Off-the-Shelf Microcontrollers
Anthony Van Herrewege and Vincent van der Leest and Andr\'e Schaller and Stefan Katzenbeisser and Ingrid Verbauwhede
2013/303 ( PDF )
Theory of masking with codewords in hardware: low-weight $d$th-order correlation-immune Boolean functions
Shivam Bhasin and Claude Carlet and Sylvain Guilley
2013/302 ( PDF )
Cryptanalysis of Grigoriev-Shpilrain Physical Asymmetric Scheme With Capacitors
Nicolas T. Courtois
2013/301 ( PDF )
Impossible Differential-Linear Cryptanalysis of Reduced-Round CLEFIA-128
Zheng Yuan and Xian Li and Haixia Liu
2013/300 ( PDF )
A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups
Allison Lewko and Sarah Meiklejohn
2013/299 ( PDF )
Computing class polynomials for abelian surfaces
Andres Enge and Emmanuel Thomé
2013/298 ( PDF )
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
Luke Mather and Elisabeth Oswald and Joe Bandenburg and Marcin Wojcik
2013/297 ( PDF )
Improvement and Efficient Implementation of a Lattice-based Signature Scheme
Rachid El~Bansarkhani and Johannes Buchmann
2013/296 ( PDF )
Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption
Morten Dahl and Ivan Damgård
2013/295 ( PDF )
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks
Micka\"el Cazorla and Kevin Marquet and Marine Minier
2013/294 ( PDF )
Synchronous Sampling and Clock Recovery of Internal Oscillators for Side Channel Analysis
Colin O'Flynn and Zhizhang (David) Chen
2013/293 ( PDF )
A Toolkit for Ring-LWE Cryptography
Vadim Lyubashevsky and Chris Peikert and Oded Regev
2013/292 ( PDF )
A Leakage Resilient MAC
Dan Martin and Elisabeth Oswald and Martijn Stam
2013/291 ( PDF )
Security ranking among assumptions within the Uber assumption framework
Antoine Joux and Antoine Rojat
2013/290 ( PDF )
Massive Group Message Authentication with Revocable Anonymity
Boaz Catane and Amir Herzberg
2013/289 ( PDF )
Secure Second Price Auctions with a Rational Auctioneer
Boaz Catane and Amir Herzberg
2013/288 ( PDF )
Key Classification Attack on Block Ciphers
Maghsoud Parviz and Seyed Hassan Mousavi and Saeed Mirahmadi
2013/287 ( PDF )
The failure of McEliece PKC based on Reed-Muller codes.
I. V. Chizhov and M. A. Borodin
2013/286 ( PDF )
Salvaging Indifferentiability in a Multi-stage Setting
Arno Mittelbach
2013/285 ( PDF )
A Novel Proof on Weil Pairing
Sutirtha Sanyal
2013/284 ( PDF )
A Secure Paper-Based Electronic Voting With No Encryption
Asghar Tavakkoli, Reza Ebrahimi Atani
2013/283 ( PDF )
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption
Dan Boneh and Ananth Raghunathan and Gil Segev
2013/282 ( PDF )
Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes
Goutam Paul and Anupam Chattopadhyay
2013/281 ( PDF )
Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting
Carlos Aguilar-Melchor and Slim Bettaieb and Xavier Boyen and Laurent Fousse and Philippe Gaborit
2013/280 ( PDF )
Path ORAM: An Extremely Simple Oblivious RAM Protocol
Emil Stefanov and Marten van Dijk and Elaine Shi and T-H. Hubert Chan and Christopher Fletcher and Ling Ren and Xiangyao Yu and Srinivas Devadas
2013/279 ( PDF )
Pinocchio: Nearly Practical Verifiable Computation
Bryan Parno and Craig Gentry and Jon Howell and Mariana Raykova
2013/278 ( PDF )
A Frequency Leakage Model and its application to CPA and DPA
S. Tiran and S. Ordas and Y. Teglia and M. Agoyan and P. Maurine
2013/277 ( PDF )
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments
Muhammad Rizwan Asghar and Mihaela Ion and Giovanni Russello and Bruno Crispo
2013/276 ( PDF )
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs
David Bernhard and Stephan Neumann and Melanie Volkamer
2013/275 ( PDF )
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI (Extended Version)
Johannes Braun and Gregor Rynkowski
2013/274 ( PDF )
A time series approach for profiling attack
Liran Lerman and Gianluca Bontempi and Souhaib Ben Taieb and Olivier Markowitch
2013/273 ( PDF )
Computing the Rank of Incidence Matrix and the Algebraic Immunity of Boolean Functions
Deepak Kumar Dalai
2013/272 ( PDF )
Cryptography Challenges for Computational Privacy in Public Clouds
Sashank Dara
2013/271 ( PDF )
The Legal Classification of Identity-Based Signatures
Christoph Sorge
2013/270 ( PDF )
Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters
Yu Yu
2013/269 ( PDF )
CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
Jonathan Trostle
2013/268 ( PDF )
Dynamic Cube Attack on Grain-v1
Majid Rahimi, Mostafa Barmshory, Mohammad Hadi Mansouri, Mohammad Reza Aref
2013/267 ( PDF )
Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction
S. Dov Gordon and Tal Malkin and Mike Rosulek and Hoeteck Wee
2013/266 ( PDF )
L-P States of RC4 Stream Cipher
Jing Lv and Dongdai Lin
2013/265 ( PDF )
Attribute-Based Encryption with Fast Decryption
Susan Hohenberger and Brent Waters
2013/264 ( PDF )
Encrypted Secret Sharing and Analysis by Plaintext Randomization
Stephen R. Tate and Roopa Vishwanathan and Scott Weeks
2013/263 ( PDF )
Speeding up QUAD
Albrecht Petzoldt
2013/262 ( PDF )
An efficient FHE based on the hardness of solving systems of non-linear multivariate equations
Gérald Gavin
2013/261 ( PDF )
Secure information transmission based on physical principles
Dima Grigoriev and Vladimir Shpilrain
2013/260 ( PDF )
From Weak to Strong Zero-Knowledge and Applications
Kai-Min Chung and Edward Lui and Rafael Pass
2013/259 ( PDF )
Private Interactive Communication Across an Adversarial Channel
Ran Gelles and Amit Sahai and Akshay Wadia
2013/258 ( PDF )
Witness Encryption and its Applications
Sanjam Garg and Craig Gentry and Amit Sahai and Brent Waters
2013/257 ( PDF )
Secure two-party computation: a visual way
Paolo D'Arco and Roberto De Prisco
2013/256 ( PDF )
On the Lossiness of the Rabin Trapdoor Function
Yannick Seurin
2013/255 ( PDF )
How to Construct an Ideal Cipher from a Small Set of Public Permutations
Rodolphe Lampe and Yannick Seurin
2013/254 ( PDF )
Towards Adoption of DNSSEC: Availability and Security Challenges
Amir Herzberg and Haya Shulman
2013/253 ( PDF )
CacheAudit: A Tool for the Static Analysis of Cache Side Channels
Goran Doychev and Dominik Feld and Boris Köpf and Laurent Mauborgne and Jan Reineke
2013/252 ( PDF )
On the Primitivity of some Trinomials over Finite Fields
LI Yujuan, WANG Huaifu, ZHAO Jinhua
2013/251 ( PDF )
Permutation Polynomials and Their Differential Properties over Residue Class Rings
Yuyin Yu and Mingsheng Wang
2013/250 ( PDF )
Fully Homomorphic Encryption for Mathematicians
Alice Silverberg
2013/249 ( PDF )
How to Factor N_1 and N_2 When p_1=p_2 mod 2^t
Kaoru Kurosawa and Takuma Ueda
2013/248 ( PDF )
Another Look at Security Theorems for 1-Key Nested MACs
Neal Koblitz and Alfred Menezes
2013/247 ( PDF )
Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction
Mingwu Zhang and Wei Shi and Chunzhi Wang and Zhenhua Chen and Yi Mu
2013/246 ( PDF )
A Lever Function to a New Codomain with Adequate Indeterminacy
Shenghui Su and Maozhi Xu and Shuwang Lv
2013/245 ( PDF )
The Fiat-Shamir Transformation in a Quantum World
Özgür Dagdelen and Marc Fischlin and Tommaso Gagliardoni
2013/244 ( PDF )
Cryptographic schemes, key exchange, public key.
Ted Hurley
2013/243 ( PDF )
A Simple ORAM
Kai-Min Chung and Rafael Pass
2013/242 ( PDF )
AE5 Security Notions: Definitions Implicit in the CAESAR Call
Chanathip Namprempre and Phillip Rogaway and Tom Shrimpton
2013/241 ( PDF )
The Perils of Repeating Patterns: Observation of Some Weak Keys in RC4
Joachim Strömbergson and Simon Josefsson
2013/240 ( PDF )
Algebraic analysis of Trivium-like ciphers
Sui-Guan Teo and Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson
2013/239 ( PDF )
Optimizing ORAM and Using it Efficiently for Secure Computation
Craig Gentry and Kenny Goldman and Shai Halevi and Charanjit Julta and Mariana Raykova and Daniel Wichs
2013/238 ( PDF )
Anonymity-preserving Public-Key Encryption: A Constructive Approach
Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Björn Tackmann and Daniele Venturi
2013/237 ( PDF )
Type-Based Analysis of Generic Key Management APIs (Long Version)
Pedro Adão and Riccardo Focardi and Flaminia L. Luccio
2013/236 ( PDF )
A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security
Kaitai Liang and Liming Fang and Duncan S. Wong and Willy Susilo
2013/235 ( PDF )
Ballot secrecy and ballot independence: definitions and relations
Ben Smyth and David Bernhard
2013/234 ( PDF )
A Cryptographic Analysis of OPACITY
Özgür Dagdelen and Marc Fischlin and Tommaso Gagliardoni and Giorgia Azzurra Marson and Arno Mittelbach and Cristina Onete
2013/233 ( PDF )
Attacks on JH, Gr{\o}stl and SMASH Hash Functions
Yiyuan Luo and Xuejia Lai
2013/232 ( PDF )
Quantum algorithms to check Resiliency, Symmetry and Linearity of a Boolean function
Kaushik Chakraborty and Anupam Chattopadhyay and Subhamoy Maitra
2013/231 ( PDF )
Sakura: a flexible coding for tree hashing
Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche
2013/230 ( PDF )
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt''
Yang Wang and Mark Manulis and Man Ho Au and Willy Susilo
2013/229 ( PDF )
How to Run Turing Machines on Encrypted Data
Shafi Goldwasser and Yael Kalai and Raluca Ada Popa and Vinod Vaikuntanathan and and Nickolai Zeldovich
2013/228 ( PDF )
Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited
Kwangsu Lee and Woo Kwon Koo and Dong Hoon Lee and Jong Hwan Park
2013/227 ( PDF )
Analysis of authentication and key establishment in inter-generational mobile telephony
Chunyu Tang and David A. Naumann and Susanne Wetzel
2013/226 ( PDF )
Public key exchange using semidirect product of (semi)groups
Maggie Habeeb and Delaram Kahrobaei and Charalambos Koupparis and Vladimir Shpilrain
2013/225 ( PDF )
Transparent, Distributed, and Replicated Dynamic Provable Data Possession
Mohammad Etemad and Alptekin Küpçü
2013/224 ( PDF )
On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards
Yuanyuan Zhou and Yu Yu and François-Xavier Standaert and Jean-Jacques Quisquater
2013/223 ( PDF )
The PACE|AA Protocol for Machine Readable Travel Documents, and its Security
Jens Bender and Özgür Dagdelen and Marc Fischlin and Dennis Kügler
2013/222 ( PDF )
Tight security bounds for key-alternating ciphers
Shan Chen, John Steinberger
2013/221 ( PDF )
Identity-based Aggregate Signatures with Verifiable Single Ones
Yang Zhang, Jun-liang Chen
2013/220 ( PDF )
Towards Efficient Private Distributed Computation on Unbounded Input Streams
Shlomi Dolev and Juan Garay and Niv Gilboa and Vladimir Kolesnikov and Yelena Yuditsky
2013/219 ( PDF )
Designing a Hybrid Attribute-Based Encryption Scheme Supporting Dynamic Attributes
Stefan G. Weber
2013/218 ( PDF )
Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves
Aurore Guillevic
2013/217 ( PDF )
Computing on Authenticated Data for Adjustable Predicates
Björn Deiseroth and Victoria Fehr and Marc Fischlin and Manuel Maasz and Nils Fabian Reimers and Richard Stein
2013/216 ( PDF )
Election Verifiability or Ballot Privacy: Do We Need to Choose?
Edouard Cuvelier and Olivier Pereira and Thomas Peters
2013/215 ( PDF )
Optical PUFs Reloaded
Ulrich Rührmair and Christian Hilgers and Sebastian Urban and Agnes Weiershäuser and Elias Dinter and Brigitte Forster and Christian Jirauschek
2013/214 ( PDF )
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System
Filip Zagorski and Richard T. Carback and David Chaum and Jeremy Clark and Aleksander Essex and Poorvi L. Vora
2013/213 ( PDF )
On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes
Guangjun Fan and Yongbin Zhou and F.-X. Standaert and Dengguo Feng
2013/212 ( PDF )
A Closer Look at HMAC
Krzysztof Pietrzak
2013/211 ( PDF )
A new criterion for avoiding the propagation of linear relations through an Sbox (Full version)
Christina Boura and Anne Canteaut
2013/210 ( PDF )
Cryptophia's Short Combiner for Collision-Resistant Hash Functions
Arno Mittelbach
2013/209 ( PDF )
New modular multiplication and division algorithms based on continued fraction expansion
Mourad Gouicem
2013/208 ( PDF )
CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing
Yi-Ruei Chen and Cheng-Kang Chu and Wen-Guey Tzeng and Jianying Zhou
2013/207 ( PDF )
Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication
Yanjiang Yang and Xuhua Ding and Haibing Lu and Jian Weng
2013/206 ( PDF )
Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation
Florian Kerschbaum and Hoon Wei Lim and Ivan Gudymenko
2013/205 ( PDF )
Practical and Employable Protocols for UC-Secure Circuit Evaluation over $Z_n$
Jan Camenisch and Robert R. Enderlein and Victor Shoup
2013/204 ( PDF )
Computing Privacy-Preserving Edit Distance and Smith-Waterman Problems on the GPU Architecture
Shi Pu, Jyh-Charn Liu
2013/203 ( PDF )
From oblivious AES to efficient and secure database join in the multiparty setting
Sven Laur and Riivo Talviste and Jan Willemson
2013/202 ( PDF )
Breaking NLM-MAC Generator
Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld
2013/201 ( PDF )
Non-malleable Codes from Additive Combinatorics
Divesh Aggarwal and Yevgeniy Dodis and Shachar Lovett
2013/200 ( PDF )
Selecting polynomials for the Function Field Sieve
Razvan Barbulescu
2013/199 ( PDF )
Quantum algorithms for the subset-sum problem
Daniel J. Bernstein and Stacey Jeffery and Tanja Lange and Alexander Meurer
2013/198 ( PDF )
On Evaluating Circuits with Inputs Encrypted by Different Fully Homomorphic Encryption Schemes
Zhizhou Li and Ten H. Lai
2013/197 ( PDF )
Discrete logarithm in GF(2^809) with FFS
Razvan Barbulescu and Cyril Bouvier and Jérémie Detrey and Pierrick Gaudry and Hamza Jeljeli and Emmanuel Thomé and Marion Videau and Paul Zimmermann
2013/196 ( PDF )
Fast Two-Party Secure Computation with Minimal Assumptions
abhi shelat and Chih-hao Shen
2013/195 ( PDF )
On the (re)design of an FPGA-based PUF
Philipp Grabher and Dan Page and Marcin Wójcik
2013/194 ( PDF )
On the Impossibility of Cryptography with Tamperable Randomness
Per Austrin and Kai-Min Chung and Mohammad Mahmoody and Rafael Pass and Karn Seth
2013/193 ( PDF )
Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes
Yu-Chi Chen and Raylin Tso and Willy Susilo and Xinyi Huang and Gwoboa Horng
2013/192 ( PDF )
A generalisation of Miller's algorithm and applications to pairing computations on abelian varieties
David Lubicz and Damien Robert
2013/191 ( PDF )
Improved Differential Fault Analysis on ARIA using Small Number of Faults
Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong
2013/190 ( PDF )
Power Analysis Attacks against FPGA Implementations of KLEIN
Shaohua Tang and Jianhao Wu and Weijian Li and Zheng Gong
2013/189 ( PDF )
Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes
Appala Naidu Tentu and Prabal Paul and V Ch Venkaiah
2013/188 ( PDF )
A family of 6-to-4-bit S-boxes with large linear branch number
Daniel Loebenberger and Michael Nüsken
2013/187 ( PDF )
Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model
Jorge Munilla, Alberto Peinado, Guoming Yang and Willy Susilo
2013/186 ( PDF )
On the (Im)possibility of Projecting Property in Prime-Order Setting
Jae Hong Seo
2013/185 ( PDF )
Security Analysis of Linearly Filtered NLFSRs
Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld and Harry Bartlett
2013/184 ( PDF )
The Vernam cipher is robust to small deviations from randomness
Boris Ryabko
2013/183 ( PDF )
Practical Multilinear Maps over the Integers
Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
2013/182 ( PDF )
Collusion-Resistant Domain-Specific Pseudonymous Signatures
Julien Bringer and Herve Chabanne and Alain Patey
2013/181 ( PDF )
On the evaluation of modular polynomials
Andrew V. Sutherland
2013/180 ( PDF )
A New Class of Product-sum Type Public Key Cryptosystem,K(V)$\Sigma\Pi$PKC,Constructed Based on Maximum Length Code
2013/179 ( PDF )
Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials
Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
2013/178 ( PDF )
Cryptanalysis of RC4(n,m) Stream Cipher
Mohammad Ali Orumiehchiha and Josef Pieprzyk and Elham Shakour and Ron Steinfeld
2013/177 ( PDF )
A generic construction for voting correctness at minimum cost - Application to Helios
Veronique Cortier and David Galindo and Stephane Glondu and Malika Izabachene
2013/176 ( PDF )
Distinguishing Attacks on RC4 and A New Improvement of the Cipher
Jing Lv and Bin Zhang and Dongdai Lin
2013/175 ( PDF )
Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes
Joseph A. Akinyele and Matthew Green and Susan Hohenberger and Matthew W. Pagano
2013/174 ( PDF )
Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with $n$-Bit Block and $n$-Bit Key
Deukjo Hong and Daesung Kwon
2013/173 ( PDF )
On the Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems"
Ray Perlner and Daniel Smith-Tone
2013/172 ( PDF )
On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version)
Raphael Spreitzer and Thomas Plos
2013/171 ( PDF )
Confined Guessing: New Signatures From Standard Assumptions
Florian Böhl and Dennis Hofheinz and Tibor Jager and Jessica Koch and Christoph Striecks
2013/170 ( PDF )
Fast Collision Attack on MD5
Tao Xie and Fanbao Liu and Dengguo Feng
2013/169 ( PDF )
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
David Cash and Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel Rosu and Michael Steiner
2013/168 ( PDF )
On secure embedded token design (Long Version) -- Quasi-looped Yao circuits and bounded leakage
Simon Hoerder and Kimmo Järvinen and Dan Page
2013/167 ( PDF )
Single Password Authentication
Tolga Acar and Mira Belenkiy and Alptekin Küpçü
2013/166 ( PDF )
On generalized semi-bent (and partially bent) Boolean functions
Brajesh Kumar Singh
2013/165 ( -- withdrawn -- )
A New Security and Privacy Framework for RFID In Cloud Computing
Süleyman Kardas, Serkan Çelik, Muhammed Ali Bingöl, Albert Levi
2013/164 ( PDF )
Provably Secure LWE Encryption with Smallish Uniform Noise and Secret
Daniel Cabarcas and Florian Göpfert and Patrick Weiden
2013/163 ( PDF )
Search Pattern Leakage in Searchable Encryption: Attacks and New Construction
Chang Liu and Liehuang Zhu and Mingzhong Wang and Yu-an Tan
2013/162 ( PDF )
A Non Asymptotic Analysis of Information Set Decoding
Yann Hamdaoui and Nicolas Sendrier
2013/161 ( PDF )
Completeness Theorems for All Finite Stateless 2-Party Primitives
Daniel Kraschewski
2013/160 ( PDF )
Interactive Coding, Revisited
Kai-Min Chung and Rafael Pass and Sidharth Telang
2013/159 ( PDF )
Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme
Dingding Jia and Bao Liand Yamin Liu and Qixiang Mei
2013/158 ( PDF )
Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and their Implementation on GLV-GLS Curves (Extended Version)
Armando Faz-Hernandez and Patrick Longa and Ana H. Sanchez
2013/157 ( PDF )
The fragility of AES-GCM authentication algorithm
Shay Gueron and Vlad Krasnov
2013/156 ( PDF )
Incentivizing Outsourced Computation
Mira Belenkiy and Melissa Chase and C. Chris Erway and John Jannotti and Alptekin Küpçü and Anna Lysyanskaya
2013/155 ( PDF )
MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions
Tore Kasper Frederiksen and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi
2013/154 ( PDF )
Optimal Suspicion Functions for Tardos Traitor Tracing Schemes
Jan-Jaap Oosterwijk and Boris Skoric and Jeroen Doumen
2013/153 ( PDF )
On the security of a certi cateless signature scheme in the standard model
Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang
2013/152 ( PDF )
Policy-based Secure Deletion
Christian Cachin and Kristiyan Haralambiev and Hsu-Chun Hsiao and Alessandro Sorniotti
2013/151 ( PDF )
Some Fixes To SSH
Xu ZiJie
2013/150 ( PDF )
Practical (Second) Preimage Attacks on TCS_SHA-3
Gautham Sekar and Soumyadeep Bhattacharya
2013/149 ( PDF )
Secure and Constant Cost Public Cloud Storage Auditing with Deduplication
Jiawei Yuan and Shucheng Yu
2013/148 ( PDF )
AES-like ciphers: are special S-boxes better then random ones? (Virtual isomorphisms again)
Alexander Rostovtsev
2013/147 ( PDF )
A note on the practical complexity of the NFS in the medium prime case: Smoothness of Norms
Naomi Benger and Manuel Charlemagne and Kefei Chen
2013/146 ( PDF )
High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition
Joppe W. Bos and Craig Costello and Huseyin Hisil and Kristin Lauter
2013/145 ( PDF )
Key Wrapping with a Fixed Permutation
Dmitry Khovratovich
2013/144 ( PDF )
On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes
Gordon Procter and Carlos Cid
2013/143 ( PDF )
An architecture for practical actively secure MPC with dishonest majority
Marcel Keller and Peter Scholl and Nigel P. Smart
2013/142 ( PDF )
Kisoon YOON
2013/141 ( PDF )
Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton
M. Shakiba and M. Dakhilalian and H. Mala
2013/140 ( PDF )
Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures
Marc Fischlin and Nils Fleischhacker
2013/139 ( PDF )
Rethinking Definitions of Security for Session Key Agreement
Wesley George and Charles Rackoff
2013/138 ( PDF )
Multi-bit homomorphic encryption based on learning with errors over rings
Zhang Wei, Liu Shuguang, Yang Xiaoyuan
2013/137 ( PDF )
How to Hide Circuits in MPC: An Efficient Framework for Private Function Evaluation
Payman Mohassel and Saeed Sadeghian
2013/136 ( PDF )
2048XKS-F & 4096XKS-F - Two Software Oriented High Security Block Ciphers
Dieter Schmidt
2013/135 ( PDF )
An MQ/Code Cryptosystem Proposal
Leonard J. Schulman
2013/134 ( PDF )
Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields
Nelly Fazio and Rosario Gennaro and Irippuge Milinda Perera and William E. Skeith III
2013/133 ( PDF )
New Lattice Based Signature Using The Jordan Normal Form
Hemlata Nagesh and Birendra Kumar Sharma
2013/132 ( PDF )
Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme
Niu Liu and Shaohua Tang and Lingling Xu
2013/131 ( PDF )
Two is the fastest prime: lambda coordinates for binary elliptic curves
Thomaz Oliveira and Julio López and Diego F. Aranha and Francisco Rodríguez-Henríquez
2013/130 ( PDF )
Blank Digital Signatures
Christian Hanser and Daniel Slamanig
2013/129 ( PDF )
An Ideal-Security Protocol for Order-Preserving Encoding
Raluca Ada Popa and Frank H. Li and Nickolai Zeldovich
2013/128 ( PDF )
Attribute-Based Encryption for Circuits from Multilinear Maps
Sanjam Garg and Craig Gentry and Shai Halevi and Amit Sahai and Brent Waters
2013/127 ( PDF )
Oblivious PAKE: Efficient Handling of Password Trials
Franziskus Kiefer and Mark Manulis
2013/126 ( PDF )
Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key
Aysajan Abidin and Jan-Åke Larsson
2013/125 ( PDF )
Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
Ananth Raghunathan and Gil Segev and Salil Vadhan
2013/124 ( -- withdrawn -- )
Tamper Resilient Cryptography Without Self-Destruct
Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi,
2013/123 ( PDF )
Analysis and Improvement of Lindell's UC-Secure Commitment Schemes
Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
2013/122 ( PDF )
Practical collision attack on 40-step RIPEMD-128
Gaoli Wang
2013/121 ( PDF )
Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes
Helger Lipmaa
2013/120 ( PDF )
An Attack Against Fixed Value Discrete Logarithm Representations
Gergely Alpár and Jaap-Henk Hoepman and Wouter Lueks
2013/119 ( PDF )
Speeding up Ate Pairing Computation in Affine Coordinates
Duc-Phong Le and Chik How Tan
2013/118 ( PDF )
Throughput Optimized Implementations of QUAD
Jason R. Hamlet and Robert W. Brocato
2013/117 ( PDF )
On r-th Root Extraction Algorithm in F_q For q=lr^s+1 (mod r^(s+1)) with 0 < l < r and Small s
Namhun Koo and Gook Hwa Cho and Soonhak Kwon
2013/116 ( PDF )
The Algorithm of AAES
Shiyong Zhang and Gongliang Chen and Lei Fan
2013/115 ( PDF )
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release
Kaitai Liang and Qiong Huang and Roman Schlegel and Duncan S. Wong and Chunming Tang
2013/114 ( PDF )
Public Key Exchange Using Matrices Over Group Rings
Delaram Kahrobaei and Charalambos Koupparis and Vladimir Shpilrain
2013/113 ( PDF )
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA
Nuray At and Jean-Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki
2013/112 ( PDF )
PUF Modeling Attacks on Simulated and Silicon Data
Ulrich Rührmair and Jan Sölter and Frank Sehnke and Xiaolin Xu and Ahmed Mahmoud and Vera Stoyanova and Gideon Dror and Jürgen Schmidhuber and Wayne Burleson and Srinivas Devadas
2013/111 ( PDF )
Message Authentication Codes Secure against Additively Related-Key Attacks
Keita Xagawa
2013/110 ( PDF )
Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness
Gilad Asharov and Yehuda Lindell and Tal Rabin
2013/109 ( PDF )
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
Charanjit S. Jutla and Arnab Roy
2013/108 ( PDF )
Unconditionally Secure and Universally Composable Commitments from Physical Assumptions
Ivan Damgard and Alessandra Scafuro
2013/107 ( PDF )
On the Arithmetic Complexity of Strassen-Like Matrix Multiplications
Murat Cenk and M. Anwar Hasan
2013/106 ( -- withdrawn -- )
URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme
Roohallah Rastaghi
2013/105 ( PDF )
Lossy Chains and Fractional Secret Sharing
Yuval Ishai and Eyal Kushilevitz and Omer Strulovich
2013/104 ( PDF )
A Tutorial on White-box AES
James A. Muir
2013/103 ( PDF )
On the Complexity of Broadcast Setup
Martin Hirt and Pavel Raykov
2013/102 ( PDF )
On the Negative Effects of Trend Noise and Its Applications in Side-Channel Cryptanalysis
Yuchen Cao, Yongbin Zhou and Zhenmei Yu
2013/101 ( PDF )
Notions of Black-Box Reductions, Revisited
Paul Baecher and Christina Brzuska and Marc Fischlin
2013/100 ( PDF )
Attacks and Comments on Several Recently Proposed Key Management Schemes
Niu Liu and Shaohua Tang and Lingling Xu
2013/099 ( PDF )
Constant-round secure two-party computation from a linear number of oblivious transfer
Samuel Ranellucci and Alain Tapp
2013/098 ( PDF )
Learning with Rounding, Revisited: New Reduction, Properties and Applications
Joel Alwen and Stephan Krenn and Krzysztof Pietrzak and Daniel Wichs
2013/097 ( PDF )
Biclique Cryptanalysis of the Full-Round KLEIN Block Cipher
Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref
2013/096 ( PDF )
State convergence in bit-based stream ciphers
Sui-Guan Teo and Harry Bartlett and Ali Alhamdan and Leonie Simpson and Kenneth Koon-Ho Wong and Ed Dawson
2013/095 ( PDF )
A new index calculus algorithm with complexity $L(1/4+o(1))$ in very small characteristic
Antoine Joux
2013/094 ( PDF )
On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption
Adriana Lopez-Alt and Eran Tromer and Vinod Vaikuntanathan
2013/093 ( PDF )
On the security of a certificateless aggregate signature scheme
Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang and Liming Zhou
2013/092 ( PDF )
Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs
Vadim Lyubashevsky and Daniel Masny
2013/091 ( PDF )
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers
Hui Zhao, Yongbin Zhou, Francois-Xavier Standaert, Hailong Zhang
2013/090 ( -- withdrawn -- )
Functional Encryption Supporting Recursive Languages
Somindu C. Ramanna and Palash Sarkar
2013/089 ( PDF )
Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis.
James McLaughlin and John A. Clark
2013/088 ( PDF )
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
Dan Boneh and Mark Zhandry
2013/087 ( PDF )
Square Root Algorithm in F_q for q=2^s+1 (mod 2^(s+1))
Namhun Koo and Gook Hwa Cho and Soonhak Kwon
2013/086 ( PDF )
Efficient Private File Retrieval by Combining ORAM and PIR
Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan
2013/085 ( PDF )
Between a Rock and a Hard Place: Interpolating Between MPC and FHE
Ashish Choudhury and Jake Loftus and Emmanuela Orsini and Arpita Patra and Nigel P. Smart
2013/084 ( PDF )
Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks
Boris Skoric and Allard P. Mosk and Pepijn W.H. Pinkse
2013/083 ( PDF )
A Security Framework for Analysis and Design of Software Attestation
Frederik Armknecht and Ahmad-Reza Sadeghi and Steffen Schulz and Christian Wachsmann
2013/082 ( PDF )
Secret Sharing, Rank Inequalities and Information Inequalities
Sebastia Martin and Carles Padro and An Yang
2013/081 ( PDF )
Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
Yan Huang and Jonathan Katz and Dave Evans
2013/080 ( PDF )
An efficient attack of a McEliece cryptosystem variant based on convolutional codes
Grégory Landais and Jean-Pierre Tillich
2013/079 ( PDF )
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
2013/078 ( PDF )
Broadcast Steganography
Nelly Fazio and Antonio R. Nicolosi and Irippuge Milinda Perera
2013/077 ( PDF )
UC-Secure Multi-Session OT Using Tamper-Proof Hardware
Kaoru Kurosawa and Ro Nojima and Le Trieu Phong
2013/076 ( PDF )
Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors
Ling Ren and Xiangyao Yu and Christopher W. Fletcher and Marten van Dijk and Srinivas Devadas
2013/075 ( PDF )
Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme
Joppe W. Bos and Kristin Lauter and Jake Loftus and Michael Naehrig
2013/074 ( PDF )
On the Function Field Sieve and the Impact of Higher Splitting Probabilities: Application to Discrete Logarithms in $\F_{2^{1971}}$ and $\F_{2^{3164}}$
Faruk G\"olo\u{g}lu and Robert Granger and Gary McGuire and Jens Zumbr\"agel
2013/073 ( PDF )
Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently
Marek Jawurek and Florian Kerschbaum and Claudio Orlandi
2013/072 ( PDF )
The UC approach: an application view
István Vajda
2013/071 ( PDF )
Relation collection for the Function Field Sieve
Jérémie Detrey and Pierrick Gaudry and Marion Videau
2013/070 ( PDF )
Related-key Attacks Against Full Hummingbird-2
Markku-Juhani O. Saarinen
2013/069 ( PDF )
Hardness of SIS and LWE with Small Parameters
Daniele Micciancio and Chris Peikert
2013/068 ( PDF )
Why Proving HIBE Systems Secure is Difficult
Allison Lewko and Brent Waters
2013/067 ( PDF )
Power Analysis of Hardware Implementations Protected with Secret Sharing
Guido Bertoni and Joan Daemen and Nicolas Debande and Thanh-Ha Le and Michael Peeters and Gilles Van Assche
2013/066 ( PDF )
Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard
Amin Mohammadali; Zahra Ahmadian; Mohammad Reza Aref
2013/065 ( PDF )
Instantiating Treeless Signature Schemes
Patrick Weiden and Andreas Hülsing and Daniel Cabarcas and Johannes Buchmann
2013/064 ( PDF )
Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols
Sven Laur and Bingsheng Zhang
2013/063 ( PDF )
A Verifiable 1-out-of-n Distributed Oblivious Transfer Protocol
Christian L. F. Corniaux and Hossein Ghodosi
2013/062 ( PDF )
Symbolic Universal Composability
Florian Böhl and Dominique Unruh
2013/061 ( PS PS.GZ PDF )
On the Indifferentiability of Key-Alternating Ciphers
Elena Andreeva and Andrey Bogdanov and Yevgeniy Dodis and Bart Mennink and John P. Steinberger
2013/060 ( PDF )
On FHE without bootstrapping
Aayush Jain
2013/059 ( PDF )
Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers
Ayesha Khalid and Deblin Bagchi and Goutam Paul and Anupam Chattopadhyay
2013/058 ( PDF )
Cryptanalysis of the Dragonfly Key Exchange Protocol
Dylan Clarke and Feng Hao
2013/057 ( PDF )
CRT-based Fully Homomorphic Encryption over the Integers
Jinsu Kim and Moon Sung Lee and Aaram Yun and Jung Hee Cheon
2013/056 ( PDF )
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography
Kishan Chand Gupta and Indranil Ghosh Ray
2013/055 ( PDF )
Secrecy without one-way functions
Dima Grigoriev and Vladimir Shpilrain
2013/054 ( PDF )
Joint Compartmented Threshold Access Structures
Ali Aydın Selçuk and Ramazan Yılmaz
2013/053 ( PDF )
A revocable certificateless signature scheme
Yinxia Sun and Futai Zhang and Limin Shen and Robert H. Deng
2013/052 ( PDF )
Some Complexity Results and Bit Unpredictable for Short Vector Problem
Kuan Cheng
2013/051 ( PDF )
Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation
Payman Mohassel and Ben Riva
2013/050 ( PS PS.GZ PDF )
Cryptanalysis and Improvement of Akleylek et al.'s cryptosystem
Roohallah Rastaghi
2013/049 ( PDF )
Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses
Christopher Meyer and Jörg Schwenk
2013/048 ( PDF )
Power Balanced Circuits for Leakage-Power-Attacks Resilient Design
Basel Halak, Julian Murphy, Alex Yakovlev
2013/047 ( PDF )
Lower Bounds on the Information Ratio of Linear Secret Sharing Schemes
Carles Padro
2013/046 ( PDF )
Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen
2013/045 ( -- withdrawn -- )
Towards Efficient Verifiable SQL Query for Outsourced Dynamic Databases in Cloud
Jiawei Yuan and Shucheng Yu
2013/044 ( PDF )
Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions
Fangguo Zhang and Xu Ma and Shengli Liu
2013/043 ( PDF )
Differential Fault Attack on the PRINCE Block Cipher
Ling Song and Lei Hu
2013/042 ( PDF )
Complexity of Multi-Party Computation Functionalities
Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek
2013/041 ( PDF )
Trace Expression of r-th Root over Finite Field
Gook Hwa Cho and Namhun Koo and Eunhye Ha and Soonhak Kwon
2013/040 ( PDF )
An Efficient CCA2-Secure Variant of the McEliece Cryptosystem in the Standard Model
Roohallah Rastaghi
2013/039 ( PDF )
Creating a Challenge for Ideal Lattices
Thomas Plantard and Michael Schneider
2013/038 ( PDF )
Verifiable Data Streaming
Dominique Schröder and Heike Schröder
2013/037 ( PDF )
Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles
Jayaprakash Kar
2013/036 ( PDF )
Batch Fully Homomorphic Encryption over the Integers
Jean-Sébastien Coron and Tancrède Lepoint and Mehdi Tibouchi
2013/035 ( -- withdrawn -- )
Improvements to NFC Mobile Transaction and Authentication Protocol
Muhammad Qasim Saeed
2013/034 ( PDF )
New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange
Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
2013/033 ( PDF )
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems
Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao
2013/032 ( PDF )
Detection of Cheaters in Non-interactive Polynomial Evaluation
Maki Yoshida and Satoshi Obana
2013/031 ( PDF )
An Analysis of the EMV Channel Establishment Protocol
Christina Brzuska and Nigel P. Smart and Bogdan Warinschi and Gaven J. Watson
2013/030 ( PDF )
On the security of an identity-based authenticated group key agreement protocol for imbalanced mobile networks
Haiyan Sun
2013/029 ( PDF )
Improved Differential Fault Attack on MICKEY 2.0
Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar
2013/028 ( PDF )
More on linear hulls of PRESENT-like ciphers and a cryptanalysis of full-round EPCBC-96
Stanislav Bulygin
2013/027 ( PDF )
Anonymity Guarantees of the UMTS/LTE Authentication and Connection Protocol
Ming-Feng Lee and Nigel P. Smart and Bogdan Warinschi and Gaven Watson
2013/026 ( PDF )
RSA private key reconstruction from random bits using SAT solvers
Constantinos Patsakis
2013/025 ( PDF )
The IITM Model: a Simple and Expressive Model for Universal Composability
Ralf Kuesters and Max Tuengerthal
2013/024 ( PDF )
New Cube Root Algorithm Based on Third Order Linear Recurrence Relation in Finite Field
Gook Hwa Cho and Namhun Koo and Eunhye Ha and Soonhak Kwon
2013/023 ( PDF )
A New Practical Identity-Based Encryption System
Jong Hwan Park and Dong Hoon Lee
2013/022 ( PDF )
Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations.
James McLaughlin and John A. Clark
2013/021 ( PDF )
Rate-Limited Secure Function Evaluation: Definitions and Constructions
Özgür Dagdelen and Payman Mohassel and Daniele Venturi
2013/020 ( PDF )
Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles
Markus Rückert and Dominique Schroeder
2013/019 ( PDF )
Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers
Peter Gaži
2013/018 ( PDF )
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
Jae Hong Seo and Keita Emura
2013/017 ( PDF )
Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions
Alexandra Boldyreva and Robert Lychev
2013/016 ( PDF )
Revocable Identity-Based Encryption Revisited: Security Model and Construction
Jae Hong Seo and Keita Emura
2013/015 ( PDF )
Complete and Unified Group Laws are not Enough for Elliptic Curve Cryptography
Graham Enos
2013/014 ( PDF )
On formal and automatic security verification of WSN transport protocols
Ta Vinh Thong and Amit Dvir
2013/013 ( PDF )
Efficiently Outsourcing Multiparty Computation under Multiple Keys
Andreas Peter and Erik Tews and Stefan Katzenbeisser
2013/012 ( PDF )
Tropical cryptography
Dima Grigoriev and Vladimir Shpilrain
2013/011 ( PDF )
Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity.
James McLaughlin and John A. Clark
2013/010 ( PDF )
Simultaneous Resettable WI from One-way Functions
Kai-Min Chung and Rafael Pass
2013/009 ( PDF )
Achieving Anonymity Against Major Face Recognition Algorithms
Benedikt Driessen and Markus Dürmuth
2013/008 ( PDF )
Non-Black-Box Simulation from One-Way Functions And Applications to Resettable Security
Kai-Min Chung and Rafael Pass and Karn Seth
2013/007 ( PDF )
A Matrix Approach for Constructing Quadratic APN Functions
Yuyin Yu and Mingsheng Wang and Yongqiang Li
2013/006 ( PDF )
Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
Qingfeng Cheng
2013/005 ( PDF )
Efficient Multiplier for pairings over Barreto-Naehrig Curves on Virtex-6 FPGA
Riadh Brinci, Walid Khmiriy, Mefteh Mbarekz, Abdellatif Ben Rabaˆa, Ammar Bouallegue and Faouzi Chekir
2013/004 ( PDF )
Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices
Damien Stehlé and Ron Steinfeld
2013/003 ( PDF )
On Formal Expressions of BRW-polynomials
Guillermo Morales-Luna
2013/002 ( PDF )
Generalized (Identity-Based) Hash Proof System and Its Applications
Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao
2013/001 ( PDF )
Shielding circuits with groups
Eric Miles and Emanuele Viola

[ Cryptology ePrint archive ]